Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-33186 (GCVE-0-2026-33186)
Vulnerability from cvelistv5 – Published: 2026-03-20 22:23 – Updated: 2026-03-24 18:09- CWE-285 - Improper Authorization
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-33186",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-24T18:08:38.989284Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-24T18:09:13.422Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "grpc-go",
"vendor": "grpc",
"versions": [
{
"status": "affected",
"version": "\u003c 1.79.3"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, \"deny\" rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback \"allow\" rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific \"deny\" rules for canonical paths but allows other requests by default (a fallback \"allow\" rule). The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string. While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy hardening."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "CWE-285: Improper Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-20T22:23:32.147Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"source": {
"advisory": "GHSA-p77j-4mvh-x3m3",
"discovery": "UNKNOWN"
},
"title": "gRPC-Go has an authorization bypass via missing leading slash in :path"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-33186",
"datePublished": "2026-03-20T22:23:32.147Z",
"dateReserved": "2026-03-17T22:16:36.720Z",
"dateUpdated": "2026-03-24T18:09:13.422Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-33186\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-03-20T23:16:45.180\",\"lastModified\":\"2026-03-23T14:32:02.800\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, \\\"deny\\\" rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback \\\"allow\\\" rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific \\\"deny\\\" rules for canonical paths but allows other requests by default (a fallback \\\"allow\\\" rule). The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string. While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy hardening.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]}],\"references\":[{\"url\":\"https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3\",\"source\":\"security-advisories@github.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-33186\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-24T18:08:38.989284Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-24T18:09:03.096Z\"}}], \"cna\": {\"title\": \"gRPC-Go has an authorization bypass via missing leading slash in :path\", \"source\": {\"advisory\": \"GHSA-p77j-4mvh-x3m3\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"grpc\", \"product\": \"grpc-go\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 1.79.3\"}]}], \"references\": [{\"url\": \"https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3\", \"name\": \"https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, \\\"deny\\\" rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback \\\"allow\\\" rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific \\\"deny\\\" rules for canonical paths but allows other requests by default (a fallback \\\"allow\\\" rule). The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string. While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy hardening.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-285\", \"description\": \"CWE-285: Improper Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-03-20T22:23:32.147Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-33186\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-24T18:09:13.422Z\", \"dateReserved\": \"2026-03-17T22:16:36.720Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-03-20T22:23:32.147Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
cleanstart-2026-ce02533
Vulnerability from cleanstart
Multiple security vulnerabilities affect the step-issuer package. These issues are resolved in later releases. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "step-issuer"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.9.9-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the step-issuer package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-CE02533",
"modified": "2026-03-25T10:51:25Z",
"published": "2026-04-01T09:21:33.459909Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-CE02533.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-62820"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-30836"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q4r8-xm5f-56gw"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62820"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-30836"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2025-62820, CVE-2026-30836, CVE-2026-33186, ghsa-p77j-4mvh-x3m3, ghsa-q4r8-xm5f-56gw applied in versions: 0.10.1-r0, 0.9.10-r0, 0.9.9-r0, 0.9.9-r1",
"upstream": [
"CVE-2025-58183",
"CVE-2025-58185",
"CVE-2025-58187",
"CVE-2025-58188",
"CVE-2025-58189",
"CVE-2025-61723",
"CVE-2025-61724",
"CVE-2025-61725",
"CVE-2025-61729",
"CVE-2025-62820",
"CVE-2026-30836",
"CVE-2026-33186",
"ghsa-p77j-4mvh-x3m3",
"ghsa-q4r8-xm5f-56gw"
]
}
cleanstart-2026-dp35743
Vulnerability from cleanstart
Multiple security vulnerabilities affect the opentofu-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "opentofu-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the opentofu-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-DP35743",
"modified": "2026-03-20T04:50:14Z",
"published": "2026-04-01T09:38:30.680533Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DP35743.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c6gw-w398-hv78"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jc7w-c686-c4v9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-wjrx-6529-hcj3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.7.10-r0, 1.7.10-r1, 1.7.10-r2, 1.7.10-r3, 1.9.4-r0",
"upstream": [
"CVE-2024-10005",
"CVE-2024-10006",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-24515",
"CVE-2026-25210",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-2464-8j7c-4cjm",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-6v2p-p543-phr9",
"ghsa-c6gw-w398-hv78",
"ghsa-fv92-fjc5-jj9h",
"ghsa-hcg3-q754-cr77",
"ghsa-jc7w-c686-c4v9",
"ghsa-mh63-6h87-95cp",
"ghsa-p77j-4mvh-x3m3",
"ghsa-q9hv-hpm4-hj6x",
"ghsa-qxp5-gwg8-xv66",
"ghsa-vvgc-356p-c3xw",
"ghsa-wjrx-6529-hcj3"
]
}
cleanstart-2026-ic68874
Vulnerability from cleanstart
Multiple security vulnerabilities affect the harbor-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "harbor-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.13.4-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the harbor-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-IC68874",
"modified": "2026-03-25T11:32:52Z",
"published": "2026-04-01T09:20:18.599218Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-IC68874.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.13.4-r0, 2.13.4-r1",
"upstream": [
"CVE-2025-15558",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186"
]
}
cleanstart-2026-am88528
Vulnerability from cleanstart
Multiple security vulnerabilities affect the argo-workflows package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "argo-workflows"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.7.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the argo-workflows package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-AM88528",
"modified": "2026-03-23T14:25:49Z",
"published": "2026-04-01T09:27:52.956018Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-AM88528.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-37cx-329c-33x3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p436-gjf2-799p"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.19-r0, 3.6.19-r1, 3.6.19-r2, 3.6.19-r3, 3.7.4-r0",
"upstream": [
"CVE-2025-15558",
"CVE-2025-61729",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-25934",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-2464-8j7c-4cjm",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-37cx-329c-33x3",
"ghsa-fv92-fjc5-jj9h",
"ghsa-fw7p-63qq-7hpr",
"ghsa-p436-gjf2-799p",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-ls30652
Vulnerability from cleanstart
Multiple security vulnerabilities affect the argo-workflows-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "argo-workflows-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.0.2-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the argo-workflows-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-LS30652",
"modified": "2026-03-30T12:04:05Z",
"published": "2026-04-01T09:07:01.631355Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-LS30652.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-0913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-4673"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-62156"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-62157"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-37cx-329c-33x3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c2hv-4pfj-mm2r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-cfpf-hrx2-8rv6"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p436-gjf2-799p"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p84v-gxvw-73pf"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4673"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62156"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62157"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-33186, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.11-r0, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0, 3.7.9-r1, 3.7.9-r2, 4.0.2-r0",
"upstream": [
"CVE-2025-0913",
"CVE-2025-15558",
"CVE-2025-4673",
"CVE-2025-47907",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-62156",
"CVE-2025-62157",
"CVE-2026-24051",
"CVE-2026-25934",
"CVE-2026-26958",
"CVE-2026-33186",
"ghsa-37cx-329c-33x3",
"ghsa-c2hv-4pfj-mm2r",
"ghsa-cfpf-hrx2-8rv6",
"ghsa-fw7p-63qq-7hpr",
"ghsa-p436-gjf2-799p",
"ghsa-p77j-4mvh-x3m3",
"ghsa-p84v-gxvw-73pf"
]
}
cleanstart-2026-nc32267
Vulnerability from cleanstart
Multiple security vulnerabilities affect the cloudnative-pg-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "cloudnative-pg-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.28.1-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the cloudnative-pg-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-NC32267",
"modified": "2026-03-23T07:39:20Z",
"published": "2026-04-01T09:31:06.582607Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-NC32267.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.24.4-r0, 1.28.1-r0, 1.28.1-r1",
"upstream": [
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186"
]
}
cleanstart-2026-ka15295
Vulnerability from cleanstart
Multiple security vulnerabilities affect the fluent-operator-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "fluent-operator-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.7.0.-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the fluent-operator-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-KA15295",
"modified": "2026-03-23T14:26:32Z",
"published": "2026-04-01T09:27:33.488765Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-KA15295.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.7.0-r0, 3.7.0.-r1",
"upstream": [
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-gk29346
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kyverno-policy-reporter-kyverno-plugin-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kyverno-policy-reporter-kyverno-plugin-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.2-r7"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kyverno-policy-reporter-kyverno-plugin-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-GK29346",
"modified": "2026-03-25T11:02:44Z",
"published": "2026-04-01T09:22:17.389111Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-GK29346.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-66564"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-22039"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-22703"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-22772"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-23831"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-23881"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24117"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24137"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-29wx-vh33-7x7r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-459x-q9hg-4gpq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-4qg8-fj49-pxjh"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-4vq8-7jfc-9cvp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6m8w-jc87-6cr7"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-88jx-383q-w4qc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-95pr-fxf5-86gv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c5q2-7r4c-mv6g"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c6gw-w398-hv78"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c77r-fh37-x2px"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f83f-xpx7-ffpw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jrr2-x33p-6hvc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mqqf-5wvp-8fh8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qjvc-p88j-j9rm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r5p3-955p-5ggq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-v23v-6jw2-98fq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-v6v8-xj6m-xwqh"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xw73-rw38-6vjc"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66564"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22039"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22703"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22772"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23831"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23881"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24117"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24137"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-1229, CVE-2026-22039, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23881, CVE-2026-24051, CVE-2026-24117, CVE-2026-24137, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-29wx-vh33-7x7r, ghsa-2x5j-vhc8-9cwm, ghsa-459x-q9hg-4gpq, ghsa-4qg8-fj49-pxjh, ghsa-4vq8-7jfc-9cvp, ghsa-6m8w-jc87-6cr7, ghsa-88jx-383q-w4qc, ghsa-95pr-fxf5-86gv, ghsa-c5q2-7r4c-mv6g, ghsa-c6gw-w398-hv78, ghsa-c77r-fh37-x2px, ghsa-f83f-xpx7-ffpw, ghsa-fv92-fjc5-jj9h, ghsa-jrr2-x33p-6hvc, ghsa-mh63-6h87-95cp, ghsa-mqqf-5wvp-8fh8, ghsa-p77j-4mvh-x3m3, ghsa-qjvc-p88j-j9rm, ghsa-r5p3-955p-5ggq, ghsa-v23v-6jw2-98fq, ghsa-v6v8-xj6m-xwqh, ghsa-xw73-rw38-6vjc applied in versions: 1.4.2-r2, 1.4.2-r4, 1.4.2-r6, 1.4.2-r7",
"upstream": [
"CVE-2025-15558",
"CVE-2025-47907",
"CVE-2025-66564",
"CVE-2026-1229",
"CVE-2026-22039",
"CVE-2026-22703",
"CVE-2026-22772",
"CVE-2026-23831",
"CVE-2026-23881",
"CVE-2026-24051",
"CVE-2026-24117",
"CVE-2026-24137",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-2464-8j7c-4cjm",
"ghsa-29wx-vh33-7x7r",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-459x-q9hg-4gpq",
"ghsa-4qg8-fj49-pxjh",
"ghsa-4vq8-7jfc-9cvp",
"ghsa-6m8w-jc87-6cr7",
"ghsa-88jx-383q-w4qc",
"ghsa-95pr-fxf5-86gv",
"ghsa-c5q2-7r4c-mv6g",
"ghsa-c6gw-w398-hv78",
"ghsa-c77r-fh37-x2px",
"ghsa-f83f-xpx7-ffpw",
"ghsa-fv92-fjc5-jj9h",
"ghsa-jrr2-x33p-6hvc",
"ghsa-mh63-6h87-95cp",
"ghsa-mqqf-5wvp-8fh8",
"ghsa-p77j-4mvh-x3m3",
"ghsa-qjvc-p88j-j9rm",
"ghsa-r5p3-955p-5ggq",
"ghsa-v23v-6jw2-98fq",
"ghsa-v6v8-xj6m-xwqh",
"ghsa-xw73-rw38-6vjc"
]
}
cleanstart-2026-pw57640
Vulnerability from cleanstart
Multiple security vulnerabilities affect the grafana-alloy-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "grafana-alloy-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.12.1-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the grafana-alloy-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-PW57640",
"modified": "2026-03-25T05:32:13Z",
"published": "2026-04-01T09:22:37.368205Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-PW57640.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4427"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-37cx-329c-33x3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6g7g-w4f8-9c9x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9mj6-hxhv-w67j"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-cfpf-hrx2-8rv6"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jqcq-xjh3-6g23"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-x6gf-mpr2-68h6"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4427"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, CVE-2026-4427, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-9h8m-3fm2-qjrq, ghsa-9mj6-hxhv-w67j, ghsa-cfpf-hrx2-8rv6, ghsa-f6x5-jh6r-wrfv, ghsa-fw7p-63qq-7hpr, ghsa-j5w8-q4qc-rx2x, ghsa-jqcq-xjh3-6g23, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-x6gf-mpr2-68h6 applied in versions: 1.12.1-r0, 1.12.1-r1, 1.12.1-r2",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-1229",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-25934",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"CVE-2026-4427",
"ghsa-37cx-329c-33x3",
"ghsa-6g7g-w4f8-9c9x",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-9mj6-hxhv-w67j",
"ghsa-cfpf-hrx2-8rv6",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-fw7p-63qq-7hpr",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-jqcq-xjh3-6g23",
"ghsa-p77j-4mvh-x3m3",
"ghsa-q9hv-hpm4-hj6x",
"ghsa-x6gf-mpr2-68h6"
]
}
cleanstart-2026-da83816
Vulnerability from cleanstart
Multiple security vulnerabilities affect the velero-plugin-for-aws package. These issues are resolved in later releases. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "velero-plugin-for-aws"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.14.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the velero-plugin-for-aws package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-DA83816",
"modified": "2026-03-22T07:39:37Z",
"published": "2026-04-01T09:35:14.283813Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DA83816.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 1.14.0-r0",
"upstream": [
"CVE-2026-33186",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-cp95927
Vulnerability from cleanstart
Multiple security vulnerabilities affect the cass-operator package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "cass-operator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.28.1-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the cass-operator package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-CP95927",
"modified": "2026-03-24T12:00:17Z",
"published": "2026-04-01T09:25:12.106009Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-CP95927.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.28.1-r0, 1.28.1-r1",
"upstream": [
"CVE-2025-61732",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-oj21550
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kubernetes package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kubernetes"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.35.3-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kubernetes package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-OJ21550",
"modified": "2026-03-28T09:40:45Z",
"published": "2026-04-01T09:12:23.484446Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-OJ21550.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2026-24051, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.34.2-r0, 1.35.0-r0, 1.35.3-r0",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-68119",
"CVE-2026-24051",
"CVE-2026-33186",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-pi36812
Vulnerability from cleanstart
Multiple security vulnerabilities affect the rabbitmq-messaging-topology-operator package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "rabbitmq-messaging-topology-operator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.19.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the rabbitmq-messaging-topology-operator package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-PI36812",
"modified": "2026-03-23T07:52:18Z",
"published": "2026-04-01T09:29:23.569974Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-PI36812.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p943-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c6gw-w398-hv78"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-p754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gw88-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-v778-237x-gjrc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-33186, ghsa-6v2p-p943-phr9, ghsa-c6gw-w398-hv78, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-p754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-qxp5-gw88-xv66, ghsa-v778-237x-gjrc, ghsa-vvgc-356p-c3xw applied in versions: 1.15.0-r1, 1.19.0-r0",
"upstream": [
"CVE-2026-33186",
"ghsa-6v2p-p943-phr9",
"ghsa-c6gw-w398-hv78",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-hcg3-p754-cr77",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-qxp5-gw88-xv66",
"ghsa-v778-237x-gjrc",
"ghsa-vvgc-356p-c3xw"
]
}
cleanstart-2026-jg61689
Vulnerability from cleanstart
Multiple security vulnerabilities affect the istio package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "istio"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.29.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the istio package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-JG61689",
"modified": "2026-03-25T13:59:35Z",
"published": "2026-04-01T09:19:48.393428Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-JG61689.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p436-gjf2-799p"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-15558, CVE-2026-33186, ghsa-p436-gjf2-799p applied in versions: 1.29.0-r0, 1.29.0-r1",
"upstream": [
"CVE-2025-15558",
"CVE-2026-33186",
"ghsa-p436-gjf2-799p"
]
}
cleanstart-2026-lp76319
Vulnerability from cleanstart
Multiple security vulnerabilities affect the vault package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "vault"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.21.2-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the vault package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-LP76319",
"modified": "2026-03-23T06:57:40Z",
"published": "2026-04-01T09:33:36.179758Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-LP76319.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.21.2-r0, 1.21.2-r1",
"upstream": [
"CVE-2025-61732",
"CVE-2025-68121",
"CVE-2026-1229",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186"
]
}
cleanstart-2026-ma32024
Vulnerability from cleanstart
Multiple security vulnerabilities affect the argo-cd-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "argo-cd-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.3.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the argo-cd-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-MA32024",
"modified": "2026-03-26T07:01:17Z",
"published": "2026-04-01T09:19:21.169476Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-MA32024.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55191"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-59537"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-59538"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2v5j-vhc3-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2vgg-9h3w-qbr4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2xsj-vh29-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-37cx-329c-33x3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-3wgm-2mw2-vh5m"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-4x4m-3c2p-qppc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-92cp-5422-2m47"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-93mq-9ffx-83m2"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hj2p-8wj8-pfq4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mw99-9chc-xw7r"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55191"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59537"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59538"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-33186, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1, 3.3.3-r0, 3.3.4-r0",
"upstream": [
"CVE-2025-55190",
"CVE-2025-55191",
"CVE-2025-58183",
"CVE-2025-58185",
"CVE-2025-58187",
"CVE-2025-58188",
"CVE-2025-58189",
"CVE-2025-59537",
"CVE-2025-59538",
"CVE-2025-61723",
"CVE-2025-61724",
"CVE-2025-61725",
"CVE-2026-1229",
"CVE-2026-24051",
"CVE-2026-25934",
"CVE-2026-33186",
"ghsa-2v5j-vhc3-9cwm",
"ghsa-2vgg-9h3w-qbr4",
"ghsa-2xsj-vh29-9cwm",
"ghsa-37cx-329c-33x3",
"ghsa-3wgm-2mw2-vh5m",
"ghsa-4x4m-3c2p-qppc",
"ghsa-6v2p-p543-phr9",
"ghsa-92cp-5422-2m47",
"ghsa-93mq-9ffx-83m2",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-hj2p-8wj8-pfq4",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-mh63-6h87-95cp",
"ghsa-mw99-9chc-xw7r"
]
}
cleanstart-2026-jk59495
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kyverno-policy-reporter-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kyverno-policy-reporter-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.4.2-r4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kyverno-policy-reporter-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-JK59495",
"modified": "2026-03-22T18:12:16Z",
"published": "2026-04-01T09:34:49.510720Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-JK59495.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-0913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-4673"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4673"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 3.3.2-r0, 3.4.2-r0, 3.4.2-r3, 3.4.2-r4",
"upstream": [
"CVE-2025-0913",
"CVE-2025-4673",
"CVE-2025-47907",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-2464-8j7c-4cjm",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-fw7p-63qq-7hpr",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-db61851
Vulnerability from cleanstart
Multiple security vulnerabilities affect the opentofu-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "opentofu-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the opentofu-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-DB61851",
"modified": "2026-03-24T08:56:04Z",
"published": "2026-04-01T09:26:58.691080Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DB61851.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c6gw-w398-hv78"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jc7w-c686-c4v9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-wjrx-6529-hcj3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.8.11-r0, 1.8.11-r1, 1.8.11-r2, 1.8.11-r3, 1.9.4-r0",
"upstream": [
"CVE-2024-10005",
"CVE-2024-10006",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-24515",
"CVE-2026-25210",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-2464-8j7c-4cjm",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-6v2p-p543-phr9",
"ghsa-c6gw-w398-hv78",
"ghsa-fv92-fjc5-jj9h",
"ghsa-hcg3-q754-cr77",
"ghsa-jc7w-c686-c4v9",
"ghsa-mh63-6h87-95cp",
"ghsa-p77j-4mvh-x3m3",
"ghsa-q9hv-hpm4-hj6x",
"ghsa-qxp5-gwg8-xv66",
"ghsa-vvgc-356p-c3xw",
"ghsa-wjrx-6529-hcj3"
]
}
cleanstart-2026-ir69938
Vulnerability from cleanstart
Multiple security vulnerabilities affect the openbao-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "openbao-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.5.1-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the openbao-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-IR69938",
"modified": "2026-03-20T11:37:58Z",
"published": "2026-04-01T09:37:08.257134Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-IR69938.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.4.4-r2, 2.5.0-r0, 2.5.1-r0, 2.5.1-r1",
"upstream": [
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2025-68121",
"CVE-2026-1229",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186"
]
}
cleanstart-2026-ez47382
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kyverno-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kyverno-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.3-r4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kyverno-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-EZ47382",
"modified": "2026-03-23T08:59:19Z",
"published": "2026-04-01T09:28:49.379705Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-EZ47382.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-66564"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-22703"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-22772"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-23831"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-23991"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-59jp-pj84-45mr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6m8w-jc87-6cr7"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jqc5-w2xx-5vq4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p436-gjf2-799p"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66564"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22703"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22772"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23831"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23991"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2025-66564, CVE-2026-22703, CVE-2026-22772, CVE-2026-23831, CVE-2026-23991, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-59jp-pj84-45mr, ghsa-6m8w-jc87-6cr7, ghsa-jqc5-w2xx-5vq4, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.16.3-r3, 1.16.3-r4",
"upstream": [
"CVE-2025-15558",
"CVE-2025-47907",
"CVE-2025-66564",
"CVE-2026-22703",
"CVE-2026-22772",
"CVE-2026-23831",
"CVE-2026-23991",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-59jp-pj84-45mr",
"ghsa-6m8w-jc87-6cr7",
"ghsa-jqc5-w2xx-5vq4",
"ghsa-p436-gjf2-799p",
"ghsa-p77j-4mvh-x3m3",
"ghsa-vvgc-356p-c3xw"
]
}
cleanstart-2026-gq31133
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kubernetes-dns-node-cache package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kubernetes-dns-node-cache"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.26.7-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kubernetes-dns-node-cache package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-GQ31133",
"modified": "2026-03-28T10:03:10Z",
"published": "2026-04-01T09:10:41.066012Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-GQ31133.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-527x-5wrf-22m2"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c9v3-4pv7-87pr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-h75p-j8xm-m278"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-527x-5wrf-22m2, ghsa-9h8m-3fm2-qjrq, ghsa-c9v3-4pv7-87pr, ghsa-h75p-j8xm-m278, ghsa-p77j-4mvh-x3m3 applied in versions: 1.26.7-r0, 1.26.7-r1, 1.26.7-r2",
"upstream": [
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-527x-5wrf-22m2",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-c9v3-4pv7-87pr",
"ghsa-h75p-j8xm-m278",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-ap81168
Vulnerability from cleanstart
Multiple security vulnerabilities affect the harbor-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "harbor-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.13.5-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the harbor-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-AP81168",
"modified": "2026-03-22T07:27:04Z",
"published": "2026-04-01T09:35:54.838524Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-AP81168.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.13.4-r0, 2.13.5-r0, 2.13.5-r1",
"upstream": [
"CVE-2021-3538",
"CVE-2025-15558",
"CVE-2025-29923",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186"
]
}
cleanstart-2026-ls12576
Vulnerability from cleanstart
Multiple security vulnerabilities affect the velero-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "velero-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the velero-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-LS12576",
"modified": "2026-03-25T14:09:04Z",
"published": "2026-04-01T09:19:50.661957Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-LS12576.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 1.16.2-r2, 1.17.2-r0, 1.17.2-r1, 1.18.0-r0",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x"
]
}
cleanstart-2026-ms81166
Vulnerability from cleanstart
Multiple security vulnerabilities affect the openbao-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "openbao-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.5.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the openbao-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-MS81166",
"modified": "2026-03-20T11:37:58Z",
"published": "2026-04-01T09:37:27.717828Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-MS81166.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.4.4-r2, 2.4.4-r4, 2.5.0-r0, 2.5.0-r1",
"upstream": [
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2025-68121",
"CVE-2026-1229",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27142",
"CVE-2026-33186"
]
}
cleanstart-2026-eb74978
Vulnerability from cleanstart
Multiple security vulnerabilities affect the grafana-mimir package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "grafana-mimir"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.2-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the grafana-mimir package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-EB74978",
"modified": "2026-03-31T15:18:53Z",
"published": "2026-04-01T09:05:49.917651Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-EB74978.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-8912"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8912"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2020-8912, CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1",
"upstream": [
"CVE-2020-8912",
"CVE-2025-61732",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-pv93827
Vulnerability from cleanstart
Multiple security vulnerabilities affect the cloudnative-pg-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "cloudnative-pg-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.25.4-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the cloudnative-pg-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-PV93827",
"modified": "2026-03-23T07:38:20Z",
"published": "2026-04-01T09:31:37.416388Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-PV93827.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24515"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25210"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.25.4-r0, 1.25.4-r1, 1.25.4-r2",
"upstream": [
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-24515",
"CVE-2026-25210",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186"
]
}
cleanstart-2026-bk28579
Vulnerability from cleanstart
Multiple security vulnerabilities affect the grafana-mimir-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "grafana-mimir-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.2-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the grafana-mimir-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-BK28579",
"modified": "2026-03-31T15:16:59Z",
"published": "2026-04-01T09:05:31.827204Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-BK28579.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 3.0.2-r0, 3.0.2-r1",
"upstream": [
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-33186",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-mt27167
Vulnerability from cleanstart
Multiple security vulnerabilities affect the harbor package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "harbor"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.14.3-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the harbor package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-MT27167",
"modified": "2026-03-22T07:06:00Z",
"published": "2026-04-01T09:36:58.329684Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-MT27167.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-53547"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55198"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55199"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-557j-xg8c-q2mm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h84-qmv7-982p"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f9f8-9pmf-xv68"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55198"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55199"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2021-3538, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.3-r0, 2.14.3-r1",
"upstream": [
"CVE-2021-3538",
"CVE-2025-29923",
"CVE-2025-53547",
"CVE-2025-55198",
"CVE-2025-55199",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27141",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-557j-xg8c-q2mm",
"ghsa-9h84-qmv7-982p",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-f9f8-9pmf-xv68",
"ghsa-j5w8-q4qc-rx2x"
]
}
cleanstart-2026-jb52011
Vulnerability from cleanstart
Multiple security vulnerabilities affect the velero-plugin-for-aws package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "velero-plugin-for-aws"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.11.1-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the velero-plugin-for-aws package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-JB52011",
"modified": "2026-03-22T07:44:23Z",
"published": "2026-04-01T09:35:29.036304Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-JB52011.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 1.11.1-r1, 1.11.1-r2",
"upstream": [
"CVE-2025-47911",
"CVE-2025-58190",
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-at91215
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kyverno-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kyverno-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.15.3-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kyverno-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-AT91215",
"modified": "2026-03-25T11:15:10Z",
"published": "2026-04-01T09:20:36.013002Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-AT91215.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6m8w-jc87-6cr7"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p436-gjf2-799p"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-15558, CVE-2025-47907, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2x5j-vhc8-9cwm, ghsa-6m8w-jc87-6cr7, ghsa-fw7p-63qq-7hpr, ghsa-p436-gjf2-799p, ghsa-p77j-4mvh-x3m3, ghsa-vvgc-356p-c3xw applied in versions: 1.14.4-r1, 1.14.4-r2, 1.15.3-r1, 1.15.3-r2",
"upstream": [
"CVE-2025-15558",
"CVE-2025-47907",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-6m8w-jc87-6cr7",
"ghsa-fw7p-63qq-7hpr",
"ghsa-p436-gjf2-799p",
"ghsa-p77j-4mvh-x3m3",
"ghsa-vvgc-356p-c3xw"
]
}
cleanstart-2026-ld15132
Vulnerability from cleanstart
Multiple security vulnerabilities affect the opentelemetry-collector-contrib-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "opentelemetry-collector-contrib-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.144.0-r3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the opentelemetry-collector-contrib-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-LD15132",
"modified": "2026-03-28T10:14:28Z",
"published": "2026-04-01T09:09:25.500286Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-LD15132.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-8912"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6g7g-w4f8-9c9x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-cfpf-hrx2-8rv6"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8912"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2020-8912, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-6g7g-w4f8-9c9x, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 0.142.0-r0, 0.144.0-r0, 0.144.0-r1, 0.144.0-r2, 0.144.0-r3",
"upstream": [
"CVE-2020-8912",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27141",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-6g7g-w4f8-9c9x",
"ghsa-cfpf-hrx2-8rv6",
"ghsa-fw7p-63qq-7hpr",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-ls00044
Vulnerability from cleanstart
Multiple security vulnerabilities affect the openbao-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "openbao-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.5.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the openbao-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-LS00044",
"modified": "2026-03-20T11:37:58Z",
"published": "2026-04-01T09:38:02.432087Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-LS00044.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-54410"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54410"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-54410, CVE-2025-58181, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.3.2-r4, 2.3.2-r5, 2.4.4-r2, 2.5.0-r0, 2.5.0-r1",
"upstream": [
"CVE-2025-47911",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-54410",
"CVE-2025-58181",
"CVE-2025-58190",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-68121",
"CVE-2026-1229",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186"
]
}
cleanstart-2026-fr61696
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kubernetes-csi-livenessprobe-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kubernetes-csi-livenessprobe-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.17.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kubernetes-csi-livenessprobe-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-FR61696",
"modified": "2026-03-23T07:49:32Z",
"published": "2026-04-01T09:29:33.599999Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-FR61696.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.17.0-r0",
"upstream": [
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186"
]
}
cleanstart-2026-lb23787
Vulnerability from cleanstart
Multiple security vulnerabilities affect the harbor package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "harbor"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.13.5-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the harbor package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-LB23787",
"modified": "2026-03-22T07:08:40Z",
"published": "2026-04-01T09:37:01.194631Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-LB23787.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-53547"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55198"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55199"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-557j-xg8c-q2mm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h84-qmv7-982p"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f9f8-9pmf-xv68"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p436-gjf2-799p"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55198"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55199"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.13.4-r0, 2.13.4-r1, 2.13.4-r2, 2.13.5-r0, 2.13.5-r1",
"upstream": [
"CVE-2021-3538",
"CVE-2025-15558",
"CVE-2025-29923",
"CVE-2025-53547",
"CVE-2025-55198",
"CVE-2025-55199",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27141",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-557j-xg8c-q2mm",
"ghsa-9h84-qmv7-982p",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-f9f8-9pmf-xv68",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-p436-gjf2-799p"
]
}
cleanstart-2026-ni04192
Vulnerability from cleanstart
Multiple security vulnerabilities affect the argo-workflows package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "argo-workflows"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.7.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the argo-workflows package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-NI04192",
"modified": "2026-03-24T12:54:01Z",
"published": "2026-04-01T09:24:43.327769Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-NI04192.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-37cx-329c-33x3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-fv92-fjc5-jj9h, ghsa-p77j-4mvh-x3m3 applied in versions: 3.6.16-r0, 3.6.18-r0, 3.6.18-r1, 3.6.18-r2, 3.7.4-r0",
"upstream": [
"CVE-2025-61729",
"CVE-2026-1229",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-25934",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-2464-8j7c-4cjm",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-37cx-329c-33x3",
"ghsa-fv92-fjc5-jj9h",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-nn77774
Vulnerability from cleanstart
Multiple security vulnerabilities affect the crossplane-provider-azure package. These issues are resolved in later releases. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "crossplane-provider-azure"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.4.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the crossplane-provider-azure package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-NN77774",
"modified": "2026-03-23T12:37:31Z",
"published": "2026-04-01T09:28:03.910369Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-NN77774.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-33186, ghsa-p77j-4mvh-x3m3 applied in versions: 2.4.0-r0",
"upstream": [
"CVE-2026-33186",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-gm63718
Vulnerability from cleanstart
Multiple security vulnerabilities affect the syft package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "syft"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.39.0-r3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the syft package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-GM63718",
"modified": "2026-03-25T14:21:09Z",
"published": "2026-04-01T09:19:09.281060Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-GM63718.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-q9hv-hpm4-hj6x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25934"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-15558, CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-25679, CVE-2026-25934, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-q9hv-hpm4-hj6x applied in versions: 1.39.0-r0, 1.39.0-r1, 1.39.0-r2, 1.39.0-r3",
"upstream": [
"CVE-2025-15558",
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-25934",
"CVE-2026-27137",
"CVE-2026-27138",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-q9hv-hpm4-hj6x"
]
}
cleanstart-2026-id24148
Vulnerability from cleanstart
Multiple security vulnerabilities affect the step package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "step"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.30.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the step package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-ID24148",
"modified": "2026-03-24T04:58:10Z",
"published": "2026-04-01T09:27:05.843609Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-ID24148.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0",
"upstream": [
"CVE-2025-58183",
"CVE-2025-58185",
"CVE-2025-58187",
"CVE-2025-58188",
"CVE-2025-58189",
"CVE-2025-61723",
"CVE-2025-61724",
"CVE-2025-61725",
"CVE-2025-61729",
"CVE-2026-33186"
]
}
cleanstart-2026-hk71313
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kserve-rest-proxy package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kserve-rest-proxy"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.12.0-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kserve-rest-proxy package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-HK71313",
"modified": "2026-03-30T06:53:15Z",
"published": "2026-04-01T09:06:39.410428Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-HK71313.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw applied in versions: 0.12.0-r0, 0.12.0-r1, 0.12.0-r2",
"upstream": [
"CVE-2025-47911",
"CVE-2025-58190",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-qxp5-gwg8-xv66",
"ghsa-vvgc-356p-c3xw"
]
}
cleanstart-2026-li47669
Vulnerability from cleanstart
Multiple security vulnerabilities affect the cloudnative-pg-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "cloudnative-pg-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.26.3-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the cloudnative-pg-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-LI47669",
"modified": "2026-03-23T07:38:42Z",
"published": "2026-04-01T09:31:09.448053Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-LI47669.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.26.2-r0, 1.26.3-r0, 1.26.3-r1",
"upstream": [
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186"
]
}
cleanstart-2026-cg86499
Vulnerability from cleanstart
Multiple security vulnerabilities affect the fluent-bit-plugin-loki package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "fluent-bit-plugin-loki"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.6.5-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the fluent-bit-plugin-loki package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-CG86499",
"modified": "2026-03-28T09:58:50Z",
"published": "2026-04-01T09:11:07.076579Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-CG86499.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 3.6.5-r0",
"upstream": [
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186"
]
}
cleanstart-2026-ow78143
Vulnerability from cleanstart
Multiple security vulnerabilities affect the keda package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "keda"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.18.3-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the keda package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-OW78143",
"modified": "2026-03-26T14:38:42Z",
"published": "2026-04-01T09:14:00.541150Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-OW78143.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68156"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-cfpf-hrx2-8rv6"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68156"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-68156, CVE-2026-24051, CVE-2026-26958, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 2.18.3-r0, 2.18.3-r1",
"upstream": [
"CVE-2025-68156",
"CVE-2026-24051",
"CVE-2026-26958",
"CVE-2026-33186",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-cfpf-hrx2-8rv6",
"ghsa-fw7p-63qq-7hpr",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-qy63788
Vulnerability from cleanstart
Multiple security vulnerabilities affect the harbor-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "harbor-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.14.3-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the harbor-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-QY63788",
"modified": "2026-03-22T07:24:09Z",
"published": "2026-04-01T09:36:08.453160Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-QY63788.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.3-r0, 2.14.3-r1",
"upstream": [
"CVE-2021-3538",
"CVE-2025-15558",
"CVE-2025-29923",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x"
]
}
cleanstart-2026-gm18965
Vulnerability from cleanstart
Multiple security vulnerabilities affect the harbor-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "harbor-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.14.2-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the harbor-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-GM18965",
"modified": "2026-03-25T11:27:12Z",
"published": "2026-04-01T09:20:25.238160Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-GM18965.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-15558, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.14.2-r2",
"upstream": [
"CVE-2025-15558",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x"
]
}
cleanstart-2026-os42112
Vulnerability from cleanstart
Multiple security vulnerabilities affect the harbor package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "harbor"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.13.4-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the harbor package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-OS42112",
"modified": "2026-03-22T07:12:11Z",
"published": "2026-04-01T09:36:49.810788Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-OS42112.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-53547"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55198"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55199"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-557j-xg8c-q2mm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h84-qmv7-982p"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f9f8-9pmf-xv68"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p436-gjf2-799p"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55198"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55199"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x, ghsa-p436-gjf2-799p applied in versions: 2.12.4-r0, 2.12.4-r1, 2.13.4-r0, 2.13.4-r1, 2.13.4-r2",
"upstream": [
"CVE-2021-3538",
"CVE-2025-15558",
"CVE-2025-29923",
"CVE-2025-53547",
"CVE-2025-55198",
"CVE-2025-55199",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27141",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-557j-xg8c-q2mm",
"ghsa-9h84-qmv7-982p",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-f9f8-9pmf-xv68",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-p436-gjf2-799p"
]
}
cleanstart-2026-jj09127
Vulnerability from cleanstart
Multiple security vulnerabilities affect the step-cli package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "step-cli"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.30.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the step-cli package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-JJ09127",
"modified": "2026-03-24T04:58:10Z",
"published": "2026-04-01T09:26:20.691727Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-JJ09127.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61729, CVE-2026-33186 applied in versions: 0.28.7-r1, 0.29.0-r0, 0.30.0-r0",
"upstream": [
"CVE-2025-58183",
"CVE-2025-58185",
"CVE-2025-58187",
"CVE-2025-58188",
"CVE-2025-58189",
"CVE-2025-61723",
"CVE-2025-61724",
"CVE-2025-61725",
"CVE-2025-61729",
"CVE-2026-33186"
]
}
cleanstart-2026-om95908
Vulnerability from cleanstart
Multiple security vulnerabilities affect the opentofu-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "opentofu-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the opentofu-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-OM95908",
"modified": "2026-03-20T04:48:45Z",
"published": "2026-04-01T09:38:28.220463Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-OM95908.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c6gw-w398-hv78"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jc7w-c686-c4v9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r92c-9c7f-3pj8"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-wjrx-6529-hcj3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-qxp5-gwg8-xv66, ghsa-r92c-9c7f-3pj8, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.10.7-r1, 1.11.4-r0, 1.11.5-r0, 1.11.5-r1, 1.11.5-r2, 1.9.4-r0",
"upstream": [
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2026-1229",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-2464-8j7c-4cjm",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-6v2p-p543-phr9",
"ghsa-c6gw-w398-hv78",
"ghsa-fv92-fjc5-jj9h",
"ghsa-hcg3-q754-cr77",
"ghsa-jc7w-c686-c4v9",
"ghsa-mh63-6h87-95cp",
"ghsa-p77j-4mvh-x3m3",
"ghsa-qxp5-gwg8-xv66",
"ghsa-r92c-9c7f-3pj8",
"ghsa-vvgc-356p-c3xw",
"ghsa-wjrx-6529-hcj3"
]
}
cleanstart-2026-mj07404
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kubernetes-dns-node-cache-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kubernetes-dns-node-cache-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.26.7-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kubernetes-dns-node-cache-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-MJ07404",
"modified": "2026-03-28T10:02:34Z",
"published": "2026-04-01T09:10:45.280620Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-MJ07404.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-527x-5wrf-22m2"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c9v3-4pv7-87pr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-h75p-j8xm-m278"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-527x-5wrf-22m2, ghsa-9h8m-3fm2-qjrq, ghsa-c9v3-4pv7-87pr, ghsa-h75p-j8xm-m278, ghsa-p77j-4mvh-x3m3 applied in versions: 1.26.7-r0, 1.26.7-r1, 1.26.7-r2",
"upstream": [
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-527x-5wrf-22m2",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-c9v3-4pv7-87pr",
"ghsa-h75p-j8xm-m278",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-gu55430
Vulnerability from cleanstart
Multiple security vulnerabilities affect the opentofu-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "opentofu-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.4-r3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the opentofu-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-GU55430",
"modified": "2026-03-20T04:52:14Z",
"published": "2026-04-01T09:37:53.639715Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-GU55430.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c6gw-w398-hv78"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jc7w-c686-c4v9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-wjrx-6529-hcj3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-9h8m-3fm2-qjrq, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.9.4-r0, 1.9.4-r1, 1.9.4-r2, 1.9.4-r3",
"upstream": [
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-2464-8j7c-4cjm",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-6v2p-p543-phr9",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-c6gw-w398-hv78",
"ghsa-fv92-fjc5-jj9h",
"ghsa-hcg3-q754-cr77",
"ghsa-jc7w-c686-c4v9",
"ghsa-mh63-6h87-95cp",
"ghsa-qxp5-gwg8-xv66",
"ghsa-vvgc-356p-c3xw",
"ghsa-wjrx-6529-hcj3"
]
}
cleanstart-2026-ee52954
Vulnerability from cleanstart
Multiple security vulnerabilities affect the harbor-registry package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "harbor-registry"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.0.1-r4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the harbor-registry package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-EE52954",
"modified": "2026-03-22T07:36:37Z",
"published": "2026-04-01T09:36:34.270182Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-EE52954.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-22871"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-4673"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22871"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4673"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58185"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58187"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58188"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58189"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61723"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61724"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61725"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2021-3538, CVE-2025-22871, CVE-2025-29923, CVE-2025-4673, CVE-2025-47907, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-hcg3-q754-cr77, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw applied in versions: 3.0.0.1-r2, 3.0.0.1-r3, 3.0.0.1-r4",
"upstream": [
"CVE-2021-3538",
"CVE-2025-22871",
"CVE-2025-29923",
"CVE-2025-4673",
"CVE-2025-47907",
"CVE-2025-58183",
"CVE-2025-58185",
"CVE-2025-58187",
"CVE-2025-58188",
"CVE-2025-58189",
"CVE-2025-61723",
"CVE-2025-61724",
"CVE-2025-61725",
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-hcg3-q754-cr77",
"ghsa-j5w8-q4qc-rx2x",
"ghsa-mh63-6h87-95cp",
"ghsa-qxp5-gwg8-xv66",
"ghsa-vvgc-356p-c3xw"
]
}
cleanstart-2026-ad71344
Vulnerability from cleanstart
Multiple security vulnerabilities affect the opentofu-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "opentofu-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the opentofu-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-AD71344",
"modified": "2026-03-20T04:46:15Z",
"published": "2026-04-01T09:38:56.500937Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-AD71344.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2464-8j7c-4cjm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2x5j-vhc8-9cwm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-6v2p-p543-phr9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-c6gw-w398-hv78"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fv92-fjc5-jj9h"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hcg3-q754-cr77"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-jc7w-c686-c4v9"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-mh63-6h87-95cp"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-qxp5-gwg8-xv66"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vvgc-356p-c3xw"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-wjrx-6529-hcj3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10005"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10006"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.10.7-r1, 1.10.9-r0, 1.10.9-r1, 1.10.9-r2, 1.10.9-r3, 1.9.4-r0",
"upstream": [
"CVE-2024-10005",
"CVE-2024-10006",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2026-1229",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-2464-8j7c-4cjm",
"ghsa-2x5j-vhc8-9cwm",
"ghsa-6v2p-p543-phr9",
"ghsa-c6gw-w398-hv78",
"ghsa-fv92-fjc5-jj9h",
"ghsa-hcg3-q754-cr77",
"ghsa-jc7w-c686-c4v9",
"ghsa-mh63-6h87-95cp",
"ghsa-p77j-4mvh-x3m3",
"ghsa-qxp5-gwg8-xv66",
"ghsa-vvgc-356p-c3xw",
"ghsa-wjrx-6529-hcj3"
]
}
cleanstart-2026-hx97842
Vulnerability from cleanstart
Multiple security vulnerabilities affect the openbao-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "openbao-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.5.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the openbao-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-HX97842",
"modified": "2026-03-20T11:37:58Z",
"published": "2026-04-01T09:37:55.704076Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-HX97842.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-54410"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54410"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1229"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-54410, CVE-2025-58181, CVE-2025-58190, CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.2.2-r6, 2.3.2-r4, 2.4.4-r2, 2.5.0-r0, 2.5.0-r1",
"upstream": [
"CVE-2025-47911",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-54410",
"CVE-2025-58181",
"CVE-2025-58190",
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2025-68121",
"CVE-2026-1229",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-26958",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186"
]
}
cleanstart-2026-ha09227
Vulnerability from cleanstart
Multiple security vulnerabilities affect the external-dns package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "external-dns"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.18.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the external-dns package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-HA09227",
"modified": "2026-03-25T14:21:54Z",
"published": "2026-04-01T09:19:28.951475Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-HA09227.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47914"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58181"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27137, CVE-2026-27138, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.18.0-r1",
"upstream": [
"CVE-2025-47911",
"CVE-2025-47913",
"CVE-2025-47914",
"CVE-2025-58181",
"CVE-2025-58190",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27137",
"CVE-2026-27138",
"CVE-2026-27139",
"CVE-2026-27141",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x"
]
}
cleanstart-2026-jf28061
Vulnerability from cleanstart
Multiple security vulnerabilities affect the keda package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "keda"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.19.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the keda package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-JF28061",
"modified": "2026-03-27T12:52:14Z",
"published": "2026-04-01T09:12:22.444974Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-JF28061.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-fw7p-63qq-7hpr"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26958"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-24051, CVE-2026-26958, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-fw7p-63qq-7hpr, ghsa-p77j-4mvh-x3m3 applied in versions: 2.19.0-r0, 2.19.0-r1",
"upstream": [
"CVE-2026-24051",
"CVE-2026-26958",
"CVE-2026-33186",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-fw7p-63qq-7hpr",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-cf63743
Vulnerability from cleanstart
Multiple security vulnerabilities affect the kubernetes package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kubernetes"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.34.6-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the kubernetes package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-CF63743",
"modified": "2026-03-28T09:39:54Z",
"published": "2026-04-01T09:12:16.516536Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-CF63743.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h8m-3fm2-qjrq"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-p77j-4mvh-x3m3"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-p77j-4mvh-x3m3 applied in versions: 1.34.2-r0, 1.34.6-r0",
"upstream": [
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2026-24051",
"CVE-2026-33186",
"ghsa-9h8m-3fm2-qjrq",
"ghsa-p77j-4mvh-x3m3"
]
}
cleanstart-2026-ae87452
Vulnerability from cleanstart
Multiple security vulnerabilities affect the smarter-device-manager-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "smarter-device-manager-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.12-r2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the smarter-device-manager-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-AE87452",
"modified": "2026-03-25T14:22:43Z",
"published": "2026-04-01T09:19:15.219275Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-AE87452.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186 applied in versions: 1.20.12-r0, 1.20.12-r1, 1.20.12-r2",
"upstream": [
"CVE-2025-47911",
"CVE-2025-58190",
"CVE-2025-61726",
"CVE-2025-61727",
"CVE-2025-61728",
"CVE-2025-61729",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27141",
"CVE-2026-27142",
"CVE-2026-33186"
]
}
cleanstart-2026-kw24478
Vulnerability from cleanstart
Multiple security vulnerabilities affect the harbor-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "harbor-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.15.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the harbor-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-KW24478",
"modified": "2026-03-22T07:20:42Z",
"published": "2026-04-01T09:36:08.569651Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-KW24478.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15558"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2021-3538, CVE-2025-15558, CVE-2025-29923, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.15.0-r0, 2.15.0-r1",
"upstream": [
"CVE-2021-3538",
"CVE-2025-15558",
"CVE-2025-29923",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-j5w8-q4qc-rx2x"
]
}
cleanstart-2026-pe63912
Vulnerability from cleanstart
Multiple security vulnerabilities affect the harbor package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "harbor"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.15.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the harbor package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-PE63912",
"modified": "2026-03-22T07:02:21Z",
"published": "2026-04-01T09:37:00.583811Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-PE63912.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-53547"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55198"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-55199"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-33186"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-557j-xg8c-q2mm"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9h84-qmv7-982p"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-f9f8-9pmf-xv68"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3538"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29923"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55198"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55199"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24051"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27139"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27141"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27142"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2021-3538, CVE-2025-29923, CVE-2025-53547, CVE-2025-55198, CVE-2025-55199, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142, CVE-2026-33186, ghsa-557j-xg8c-q2mm, ghsa-9h84-qmv7-982p, ghsa-f6x5-jh6r-wrfv, ghsa-f9f8-9pmf-xv68, ghsa-j5w8-q4qc-rx2x applied in versions: 2.14.2-r0, 2.14.2-r1, 2.15.0-r0, 2.15.0-r1",
"upstream": [
"CVE-2021-3538",
"CVE-2025-29923",
"CVE-2025-53547",
"CVE-2025-55198",
"CVE-2025-55199",
"CVE-2025-68121",
"CVE-2026-24051",
"CVE-2026-25679",
"CVE-2026-27139",
"CVE-2026-27141",
"CVE-2026-27142",
"CVE-2026-33186",
"ghsa-557j-xg8c-q2mm",
"ghsa-9h84-qmv7-982p",
"ghsa-f6x5-jh6r-wrfv",
"ghsa-f9f8-9pmf-xv68",
"ghsa-j5w8-q4qc-rx2x"
]
}
OPENSUSE-SU-2026:10474-1
Vulnerability from csaf_opensuse - Published: 2026-04-01 00:00 - Updated: 2026-04-01 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ignition-2.26.0-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the ignition-2.26.0-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10474",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10474-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33186 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33186/"
}
],
"title": "ignition-2.26.0-3.1 on GA media",
"tracking": {
"current_release_date": "2026-04-01T00:00:00Z",
"generator": {
"date": "2026-04-01T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10474-1",
"initial_release_date": "2026-04-01T00:00:00Z",
"revision_history": [
{
"date": "2026-04-01T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ignition-2.26.0-3.1.aarch64",
"product": {
"name": "ignition-2.26.0-3.1.aarch64",
"product_id": "ignition-2.26.0-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ignition-2.26.0-3.1.ppc64le",
"product": {
"name": "ignition-2.26.0-3.1.ppc64le",
"product_id": "ignition-2.26.0-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ignition-2.26.0-3.1.s390x",
"product": {
"name": "ignition-2.26.0-3.1.s390x",
"product_id": "ignition-2.26.0-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ignition-2.26.0-3.1.x86_64",
"product": {
"name": "ignition-2.26.0-3.1.x86_64",
"product_id": "ignition-2.26.0-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-2.26.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ignition-2.26.0-3.1.aarch64"
},
"product_reference": "ignition-2.26.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-2.26.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ignition-2.26.0-3.1.ppc64le"
},
"product_reference": "ignition-2.26.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-2.26.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ignition-2.26.0-3.1.s390x"
},
"product_reference": "ignition-2.26.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ignition-2.26.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ignition-2.26.0-3.1.x86_64"
},
"product_reference": "ignition-2.26.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33186"
}
],
"notes": [
{
"category": "general",
"text": "gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, \"deny\" rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback \"allow\" rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific \"deny\" rules for canonical paths but allows other requests by default (a fallback \"allow\" rule). The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string. While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy hardening.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ignition-2.26.0-3.1.aarch64",
"openSUSE Tumbleweed:ignition-2.26.0-3.1.ppc64le",
"openSUSE Tumbleweed:ignition-2.26.0-3.1.s390x",
"openSUSE Tumbleweed:ignition-2.26.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33186",
"url": "https://www.suse.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "SUSE Bug 1260085 for CVE-2026-33186",
"url": "https://bugzilla.suse.com/1260085"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ignition-2.26.0-3.1.aarch64",
"openSUSE Tumbleweed:ignition-2.26.0-3.1.ppc64le",
"openSUSE Tumbleweed:ignition-2.26.0-3.1.s390x",
"openSUSE Tumbleweed:ignition-2.26.0-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ignition-2.26.0-3.1.aarch64",
"openSUSE Tumbleweed:ignition-2.26.0-3.1.ppc64le",
"openSUSE Tumbleweed:ignition-2.26.0-3.1.s390x",
"openSUSE Tumbleweed:ignition-2.26.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-01T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-33186"
}
]
}
OPENSUSE-SU-2026:10419-1
Vulnerability from csaf_opensuse - Published: 2026-03-24 00:00 - Updated: 2026-03-24 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "rclone-1.73.3-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the rclone-1.73.3-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10419",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10419-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33186 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33186/"
}
],
"title": "rclone-1.73.3-1.1 on GA media",
"tracking": {
"current_release_date": "2026-03-24T00:00:00Z",
"generator": {
"date": "2026-03-24T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10419-1",
"initial_release_date": "2026-03-24T00:00:00Z",
"revision_history": [
{
"date": "2026-03-24T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.73.3-1.1.aarch64",
"product": {
"name": "rclone-1.73.3-1.1.aarch64",
"product_id": "rclone-1.73.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.73.3-1.1.aarch64",
"product": {
"name": "rclone-bash-completion-1.73.3-1.1.aarch64",
"product_id": "rclone-bash-completion-1.73.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.73.3-1.1.aarch64",
"product": {
"name": "rclone-zsh-completion-1.73.3-1.1.aarch64",
"product_id": "rclone-zsh-completion-1.73.3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.73.3-1.1.ppc64le",
"product": {
"name": "rclone-1.73.3-1.1.ppc64le",
"product_id": "rclone-1.73.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.73.3-1.1.ppc64le",
"product": {
"name": "rclone-bash-completion-1.73.3-1.1.ppc64le",
"product_id": "rclone-bash-completion-1.73.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.73.3-1.1.ppc64le",
"product": {
"name": "rclone-zsh-completion-1.73.3-1.1.ppc64le",
"product_id": "rclone-zsh-completion-1.73.3-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.73.3-1.1.s390x",
"product": {
"name": "rclone-1.73.3-1.1.s390x",
"product_id": "rclone-1.73.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.73.3-1.1.s390x",
"product": {
"name": "rclone-bash-completion-1.73.3-1.1.s390x",
"product_id": "rclone-bash-completion-1.73.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.73.3-1.1.s390x",
"product": {
"name": "rclone-zsh-completion-1.73.3-1.1.s390x",
"product_id": "rclone-zsh-completion-1.73.3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.73.3-1.1.x86_64",
"product": {
"name": "rclone-1.73.3-1.1.x86_64",
"product_id": "rclone-1.73.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.73.3-1.1.x86_64",
"product": {
"name": "rclone-bash-completion-1.73.3-1.1.x86_64",
"product_id": "rclone-bash-completion-1.73.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.73.3-1.1.x86_64",
"product": {
"name": "rclone-zsh-completion-1.73.3-1.1.x86_64",
"product_id": "rclone-zsh-completion-1.73.3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.73.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.73.3-1.1.aarch64"
},
"product_reference": "rclone-1.73.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.73.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.73.3-1.1.ppc64le"
},
"product_reference": "rclone-1.73.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.73.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.73.3-1.1.s390x"
},
"product_reference": "rclone-1.73.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.73.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.73.3-1.1.x86_64"
},
"product_reference": "rclone-1.73.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.73.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.aarch64"
},
"product_reference": "rclone-bash-completion-1.73.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.73.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.ppc64le"
},
"product_reference": "rclone-bash-completion-1.73.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.73.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.s390x"
},
"product_reference": "rclone-bash-completion-1.73.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.73.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.x86_64"
},
"product_reference": "rclone-bash-completion-1.73.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.73.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.aarch64"
},
"product_reference": "rclone-zsh-completion-1.73.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.73.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.ppc64le"
},
"product_reference": "rclone-zsh-completion-1.73.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.73.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.s390x"
},
"product_reference": "rclone-zsh-completion-1.73.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.73.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.x86_64"
},
"product_reference": "rclone-zsh-completion-1.73.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33186"
}
],
"notes": [
{
"category": "general",
"text": "gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, \"deny\" rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback \"allow\" rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific \"deny\" rules for canonical paths but allows other requests by default (a fallback \"allow\" rule). The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string. While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy hardening.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rclone-1.73.3-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.73.3-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.73.3-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.73.3-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33186",
"url": "https://www.suse.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "SUSE Bug 1260085 for CVE-2026-33186",
"url": "https://bugzilla.suse.com/1260085"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rclone-1.73.3-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.73.3-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.73.3-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.73.3-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:rclone-1.73.3-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.73.3-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.73.3-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.73.3-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.3-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-24T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-33186"
}
]
}
GHSA-P77J-4MVH-X3M3
Vulnerability from github – Published: 2026-03-18 20:10 – Updated: 2026-03-25 18:12Impact
What kind of vulnerability is it? Who is impacted?
It is an Authorization Bypass resulting from Improper Input Validation of the HTTP/2 :path pseudo-header.
The gRPC-Go server was too lenient in its routing logic, accepting requests where the :path omitted the mandatory leading slash (e.g., Service/Method instead of /Service/Method). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official grpc/authz package) evaluated the raw, non-canonical path string. Consequently, "deny" rules defined using canonical paths (starting with /) failed to match the incoming request, allowing it to bypass the policy if a fallback "allow" rule was present.
Who is impacted?
This affects gRPC-Go servers that meet both of the following criteria:
1. They use path-based authorization interceptors, such as the official RBAC implementation in google.golang.org/grpc/authz or custom interceptors relying on info.FullMethod or grpc.Method(ctx).
2. Their security policy contains specific "deny" rules for canonical paths but allows other requests by default (a fallback "allow" rule).
The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed :path headers directly to the gRPC server.
Patches
Has the problem been patched? What versions should users upgrade to?
Yes, the issue has been patched. The fix ensures that any request with a :path that does not start with a leading slash is immediately rejected with a codes.Unimplemented error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string.
Users should upgrade to the following versions (or newer): * v1.79.3 * The latest master branch.
It is recommended that all users employing path-based authorization (especially grpc/authz) upgrade as soon as the patch is available in a tagged release.
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods:
1. Use a Validating Interceptor (Recommended Mitigation)
Add an "outermost" interceptor to your server that validates the path before any other authorization logic runs:
func pathValidationInterceptor(ctx context.Context, req any, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (any, error) {
if info.FullMethod == "" || info.FullMethod[0] != '/' {
return nil, status.Errorf(codes.Unimplemented, "malformed method name")
}
return handler(ctx, req)
}
// Ensure this is the FIRST interceptor in your chain
s := grpc.NewServer(
grpc.ChainUnaryInterceptor(pathValidationInterceptor, authzInterceptor),
)
2. Infrastructure-Level Normalization
If your gRPC server is behind a reverse proxy or load balancer (such as Envoy, NGINX, or an L7 Cloud Load Balancer), ensure it is configured to enforce strict HTTP/2 compliance for pseudo-headers and reject or normalize requests where the :path header does not start with a leading slash.
3. Policy Hardening
Switch to a "default deny" posture in your authorization policies (explicitly listing all allowed paths and denying everything else) to reduce the risk of bypasses via malformed inputs.
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "google.golang.org/grpc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.79.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-33186"
],
"database_specific": {
"cwe_ids": [
"CWE-285"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-18T20:10:29Z",
"nvd_published_at": "2026-03-20T23:16:45Z",
"severity": "CRITICAL"
},
"details": "### Impact\n_What kind of vulnerability is it? Who is impacted?_\n\nIt is an **Authorization Bypass** resulting from **Improper Input Validation** of the HTTP/2 `:path` pseudo-header.\n\nThe gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, \"deny\" rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback \"allow\" rule was present.\n\n**Who is impacted?**\nThis affects gRPC-Go servers that meet both of the following criteria:\n1. They use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`.\n2. Their security policy contains specific \"deny\" rules for canonical paths but allows other requests by default (a fallback \"allow\" rule).\n\nThe vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server.\n\n### Patches\n_Has the problem been patched? What versions should users upgrade to?_\n\nYes, the issue has been patched. The fix ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string.\n\nUsers should upgrade to the following versions (or newer):\n* **v1.79.3**\n* The latest **master** branch.\n\nIt is recommended that all users employing path-based authorization (especially `grpc/authz`) upgrade as soon as the patch is available in a tagged release.\n\n### Workarounds\n_Is there a way for users to fix or remediate the vulnerability without upgrading?_\n\nWhile upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods:\n\n#### 1. Use a Validating Interceptor (Recommended Mitigation)\nAdd an \"outermost\" interceptor to your server that validates the path before any other authorization logic runs:\n\n```go\nfunc pathValidationInterceptor(ctx context.Context, req any, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (any, error) {\n if info.FullMethod == \"\" || info.FullMethod[0] != \u0027/\u0027 {\n return nil, status.Errorf(codes.Unimplemented, \"malformed method name\")\n } \n return handler(ctx, req)\n}\n\n// Ensure this is the FIRST interceptor in your chain\ns := grpc.NewServer(\n grpc.ChainUnaryInterceptor(pathValidationInterceptor, authzInterceptor),\n)\n```\n\n#### 2. Infrastructure-Level Normalization\nIf your gRPC server is behind a reverse proxy or load balancer (such as Envoy, NGINX, or an L7 Cloud Load Balancer), ensure it is configured to enforce strict HTTP/2 compliance for pseudo-headers and reject or normalize requests where the `:path` header does not start with a leading slash.\n\n#### 3. Policy Hardening\nSwitch to a \"default deny\" posture in your authorization policies (explicitly listing all allowed paths and denying everything else) to reduce the risk of bypasses via malformed inputs.",
"id": "GHSA-p77j-4mvh-x3m3",
"modified": "2026-03-25T18:12:09Z",
"published": "2026-03-18T20:10:29Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"type": "PACKAGE",
"url": "https://github.com/grpc/grpc-go"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "gRPC-Go has an authorization bypass via missing leading slash in :path"
}
MSRC_CVE-2026-33186
Vulnerability from csaf_microsoft - Published: 2026-03-02 00:00 - Updated: 2026-03-26 01:01| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-33186 gRPC-Go has an authorization bypass via missing leading slash in :path - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-33186.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "gRPC-Go has an authorization bypass via missing leading slash in :path",
"tracking": {
"current_release_date": "2026-03-26T01:01:16.000Z",
"generator": {
"date": "2026-03-26T07:07:42.395Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-33186",
"initial_release_date": "2026-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-03-26T01:01:16.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 grpc 1.42.0-11",
"product": {
"name": "cbl2 grpc 1.42.0-11",
"product_id": "1"
}
},
{
"category": "product_version_range",
"name": "azl3 grpc 1.62.3-1",
"product": {
"name": "azl3 grpc 1.62.3-1",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "grpc"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 grpc 1.42.0-11 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 grpc 1.62.3-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "general",
"text": "GitHub_M",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17086-1",
"17084-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-33186 gRPC-Go has an authorization bypass via missing leading slash in :path - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-33186.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-03-26T01:01:16.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-1"
]
},
{
"category": "none_available",
"date": "2026-03-26T01:01:16.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.1,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"17086-1",
"17084-2"
]
}
],
"title": "gRPC-Go has an authorization bypass via missing leading slash in :path"
}
]
}
RHSA-2026:6428
Vulnerability from csaf_redhat - Published: 2026-04-02 07:50 - Updated: 2026-04-03 08:06A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.
A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.
A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
A denial of service flaw has been discovered in the Axios npm package. the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing __proto__ as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service.
A flaw was found in node-tar. An attacker can craft a malicious archive that, when extracted with default options, creates a hardlink outside the intended extraction directory. This vulnerability allows the attacker to perform arbitrary file read and write operations as the user extracting the archive, bypassing existing path protections. This can lead to unauthorized access and modification of sensitive system files.
A flaw was found in Immutable.js, a library for persistent immutable data structures. This vulnerability, known as Prototype Pollution, allows an attacker with low privileges to inject unwanted properties into core JavaScript object prototypes without user interaction. By manipulating specific APIs such as mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject(), a remote attacker could potentially execute arbitrary code or cause a denial of service (DoS).
A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Network Observability 1.11 for Red Hat OpenShift.",
"title": "Topic"
},
{
"category": "general",
"text": "Network flows collector and monitoring solution.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:6428",
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61728",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25639",
"url": "https://access.redhat.com/security/cve/CVE-2026-25639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-26960",
"url": "https://access.redhat.com/security/cve/CVE-2026-26960"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-29063",
"url": "https://access.redhat.com/security/cve/CVE-2026-29063"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/latest/observability/network_observability/network-observability-operator-release-notes.html",
"url": "https://docs.openshift.com/container-platform/latest/observability/network_observability/network-observability-operator-release-notes.html"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6428.json"
}
],
"title": "Red Hat Security Advisory: Network Observability 1.11.1 for OpenShift",
"tracking": {
"current_release_date": "2026-04-03T08:06:00+00:00",
"generator": {
"date": "2026-04-03T08:06:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:6428",
"initial_release_date": "2026-04-02T07:50:38+00:00",
"revision_history": [
{
"date": "2026-04-02T07:50:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-02T07:50:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-03T08:06:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Network Observability (NETOBSERV) 1.11.1",
"product": {
"name": "Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_observ_optr:1.11::el9"
}
}
}
],
"category": "product_family",
"name": "Network Observability (NETOBSERV)"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256%3A7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773997913"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256%3A2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774887582"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-cli-rhel9@sha256%3A30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773992622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-compat-rhel9@sha256%3A40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256%3A3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431617"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-operator-bundle@sha256%3A325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774962696"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"product_id": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256%3A13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122?arch=amd64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774859742"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"product_id": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256%3A5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3?arch=arm64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773997913"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"product_id": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256%3Adc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518?arch=arm64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774887582"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"product_id": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-cli-rhel9@sha256%3A05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd?arch=arm64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773992622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-compat-rhel9@sha256%3A115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8?arch=arm64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256%3A1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1?arch=arm64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431617"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"product_id": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256%3A4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d?arch=arm64\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774859742"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"product_id": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256%3A791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773997913"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"product_id": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256%3A9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774887582"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"product_id": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-cli-rhel9@sha256%3Ab0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773992622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-compat-rhel9@sha256%3A03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256%3A222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431617"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"product_id": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256%3Ab5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae?arch=ppc64le\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774859742"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"product_id": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-flowlogs-pipeline-rhel9@sha256%3Aa72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088?arch=s390x\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773997913"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"product_id": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-ebpf-agent-rhel9@sha256%3A880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8?arch=s390x\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774887582"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"product_id": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-cli-rhel9@sha256%3Aa90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3?arch=s390x\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1773992622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-compat-rhel9@sha256%3A17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175?arch=s390x\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431392"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"product_id": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-console-plugin-rhel9@sha256%3A51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c?arch=s390x\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774431617"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x",
"product": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x",
"product_id": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x",
"product_identification_helper": {
"purl": "pkg:oci/network-observability-rhel9-operator@sha256%3Adc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453?arch=s390x\u0026repository_url=registry.redhat.io/network-observability\u0026tag=1774859742"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64 as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x as a component of Network Observability (NETOBSERV) 1.11.1",
"product_id": "Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
},
"product_reference": "registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x",
"relates_to_product_reference": "Network Observability (NETOBSERV) 1.11.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
},
{
"cve": "CVE-2026-25639",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"discovery_date": "2026-02-09T21:00:49.280114+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2438237"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the Axios npm package. the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing __proto__ as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios affected by Denial of Service via __proto__ Key in mergeConfig",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25639"
},
{
"category": "external",
"summary": "RHBZ#2438237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2438237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25639"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57",
"url": "https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.13.5",
"url": "https://github.com/axios/axios/releases/tag/v1.13.5"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-43fc-jf86-j433",
"url": "https://github.com/axios/axios/security/advisories/GHSA-43fc-jf86-j433"
}
],
"release_date": "2026-02-09T20:11:22.374000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "axios: Axios affected by Denial of Service via __proto__ Key in mergeConfig"
},
{
"cve": "CVE-2026-26960",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-02-20T02:01:07.883769+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2441253"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-tar. An attacker can craft a malicious archive that, when extracted with default options, creates a hardlink outside the intended extraction directory. This vulnerability allows the attacker to perform arbitrary file read and write operations as the user extracting the archive, bypassing existing path protections. This can lead to unauthorized access and modification of sensitive system files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tar: node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat environments, this condition introduces a significant constraint, as exploitation requires user interaction and reliance on unsafe handling of externally supplied archives. The attack is not remotely exploitable in isolation and depends on a user or service processing attacker-controlled input.\n\nFurthermore, the impact of the vulnerability is limited to the privileges of the extracting process. In typical Red Hat deployments, archive extraction is performed by non-privileged users or within confined environments such as containers or restricted service contexts, which limits the scope of potential damage.\n\nRed Hat analysis also notes that this issue does not provide a direct mechanism for code execution or privilege escalation, but rather enables file system manipulation within the boundaries of the executing user\u2019s permissions.\n\nGiven the requirement for user-assisted exploitation, the absence of a direct remote attack vector, and the confinement of impact to the privileges of the extracting process, Red Hat considers the practical risk to be lower than the generalized NVD assessment. As a result, this vulnerability is classified as Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26960"
},
{
"category": "external",
"summary": "RHBZ#2441253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2441253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26960",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26960"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384",
"url": "https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f",
"url": "https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f"
},
{
"category": "external",
"summary": "https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx",
"url": "https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx"
}
],
"release_date": "2026-02-20T01:07:52.979000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tar: node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation"
},
{
"cve": "CVE-2026-29063",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2026-03-06T19:00:57.982727+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Immutable.js, a library for persistent immutable data structures. This vulnerability, known as Prototype Pollution, allows an attacker with low privileges to inject unwanted properties into core JavaScript object prototypes without user interaction. By manipulating specific APIs such as mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject(), a remote attacker could potentially execute arbitrary code or cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "immutable-js: Immutable.js: Arbitrary code execution via Prototype Pollution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Exploitation of this vulnerability requires that an attacker is able to provide arbitrary data to clients of this library in a way that calls the affected functions with data the attacker controls. In most deployments, the ability to provide data in this fashion requires that an attacker has some degree of privileges to access the affected applications.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-29063"
},
{
"category": "external",
"summary": "RHBZ#2445291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-29063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29063"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-29063",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29063"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v3.8.3"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v4.3.8"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5",
"url": "https://github.com/immutable-js/immutable-js/releases/tag/v5.1.5"
},
{
"category": "external",
"summary": "https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw",
"url": "https://github.com/immutable-js/immutable-js/security/advisories/GHSA-wf6x-7x77-mvgw"
}
],
"release_date": "2026-03-06T18:25:22.438000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "immutable-js: Immutable.js: Arbitrary code execution via Prototype Pollution"
},
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
],
"known_not_affected": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-02T07:50:38+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6428"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:05ced6a12abb5c6156d57cde83a5515f1ba1ae4b4876c20df8e87acf658b55cd_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:30a1eceb88756d6bd6b2a523f4c763e2c17491d921e709b49065c8e1827e7e40_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:a90dd2247b3167d97fae23047e0dadb711b870a402fb6ae1460928e187a4a1f3_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-cli-rhel9@sha256:b0f982a4b0cf36578c2483d9487e6c6f0343043737e01b6dd1b61778ed915e80_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:03f45691cb47a4afd19a4bb61704f1c38cc6f0fb9f7bcacf4ed3070eecdc02b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:115254a3a9f613fbcec875c7e515b638da1e046f6dff8bcb0ce8aeb7bd3bcbb8_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:17faaf94edcd7636ece30fcc7372bdabdc66c5d443b1132c9a15ef6823f57175_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-compat-rhel9@sha256:40512734417b0b3555046f6034e20dc9d834819bb83dbc2e6240bd656a4b2b3b_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:1b0ed12930e073b9d9f10856abd1bf78366123a7c46d0365395ae9ffaccb8cd1_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:222e5ccbdcee7fcddfceda87216a63ea8aa46efdde0171fd1ba58b5c1e020768_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:3452169eaaeda28a490561e93089374a5e306868e221f68c14dc623de532f152_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-console-plugin-rhel9@sha256:51765514b5b6d1d205a26ad50893d11284256dd0afbd7603370c92242012973c_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:2f23661c41345f7e7625d961649fdc4432e5e9b546ca807dc50c1b685480d44f_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:880119c62568c07d28fcedfe545b92cb6e4b9e11ffb79f8405214a4810f931f8_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:9d6bc518588793ff607a20fd94a181c7028c1f7a938b713253bfddef3fbac708_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9@sha256:dc9c1e367526c7a2bae9694c253909f6716be82f89d1ceb9dc3a38528120d518_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:5218256abd119c47e49511a207521013f4e70873f5e1695cd33c7acb236167a3_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:791b6dff77ede837fe03220d73511632b719e3c9668ef1a4a7766c2c9c8fe4b4_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:7e2463af3ff443c98adf0bbfe349c7d9da90c8de34892e41b46627f30623b47a_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:a72d7f075a569e1c0ba055ca748f04fa3c6ff889de498faba215174048b9b088_s390x",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-operator-bundle@sha256:325f2d9688ef540088f75b450d209fb8dd6b7b2dfc006f492f7575f3e8678607_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:13ea96ec33fe631eea4970b4d05aaebb101d1e964047cc3cdd8e659eb1329122_amd64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:4a717354ce0dfefb859c61b6088f9e51c9e1679892359ddcbe250697e723618d_arm64",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:b5778b60be17f7e849b5aff93df89735063e003c27c61bc03abd4b899542a7ae_ppc64le",
"Network Observability (NETOBSERV) 1.11.1:registry.redhat.io/network-observability/network-observability-rhel9-operator@sha256:dc14db47fce0af17e02916369099477a584d52e113e20b47518007aa074b5453_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
}
]
}
CERTFR-2026-AVI-0366
Vulnerability from certfr_avis - Published: 2026-03-27 - Updated: 2026-03-27
De multiples vulnérabilités ont été découvertes dans Traefik. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Traefik versions v3.7.0-ea.x ant\u00e9rieures \u00e0 v3.7.0-ea.3",
"product": {
"name": "Traefik",
"vendor": {
"name": "Traefik",
"scada": false
}
}
},
{
"description": "Traefik versions ant\u00e9rieures \u00e0 v2.11.42",
"product": {
"name": "Traefik",
"vendor": {
"name": "Traefik",
"scada": false
}
}
},
{
"description": "Traefik versions v3.6.x ant\u00e9rieures \u00e0 v3.6.12",
"product": {
"name": "Traefik",
"vendor": {
"name": "Traefik",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"name": "CVE-2026-32695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32695"
},
{
"name": "CVE-2026-33433",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33433"
}
],
"initial_release_date": "2026-03-27T00:00:00",
"last_revision_date": "2026-03-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0366",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Traefik. Elles permettent \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Traefik",
"vendor_advisories": [
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Traefik GHSA-qr99-7898-vr7c",
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-qr99-7898-vr7c"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Traefik GHSA-46wh-3698-f2cx",
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-46wh-3698-f2cx"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Traefik GHSA-67jx-r9pv-98rj",
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-67jx-r9pv-98rj"
}
]
}
FKIE_CVE-2026-33186
Vulnerability from fkie_nvd - Published: 2026-03-20 23:16 - Updated: 2026-03-23 14:32| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, \"deny\" rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback \"allow\" rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific \"deny\" rules for canonical paths but allows other requests by default (a fallback \"allow\" rule). The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string. While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy hardening."
}
],
"id": "CVE-2026-33186",
"lastModified": "2026-03-23T14:32:02.800",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-03-20T23:16:45.180",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-285"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.