Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-32829 (GCVE-0-2026-32829)
Vulnerability from cvelistv5 – Published: 2026-03-20 00:49 – Updated: 2026-03-21 03:03| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-32829",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-21T03:02:22.812939Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-21T03:03:09.928Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "lz4_flex",
"vendor": "PSeitz",
"versions": [
{
"status": "affected",
"version": "\u003c 0.11.6"
},
{
"status": "affected",
"version": "\u003e= 0.12.0, \u003c 0.12.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0, decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 \"match copy operations,\" allowing out-of-bounds reads from the output buffer. The block-based API functions (`decompress_into`, `decompress_into_with_dict`, and others when `safe-decode` is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-201",
"description": "CWE-201: Insertion of Sensitive Information Into Sent Data",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-823",
"description": "CWE-823: Use of Out-of-range Pointer Offset",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-20T00:49:12.893Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/PSeitz/lz4_flex/security/advisories/GHSA-vvp9-7p8x-rfvv",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/PSeitz/lz4_flex/security/advisories/GHSA-vvp9-7p8x-rfvv"
},
{
"name": "https://github.com/PSeitz/lz4_flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/PSeitz/lz4_flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d"
},
{
"name": "https://rustsec.org/advisories/RUSTSEC-2026-0041.html",
"tags": [
"x_refsource_MISC"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0041.html"
}
],
"source": {
"advisory": "GHSA-vvp9-7p8x-rfvv",
"discovery": "UNKNOWN"
},
"title": "lz4_flex: Decompression can leak information from uninitialized memory or reused output buffer"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-32829",
"datePublished": "2026-03-20T00:49:12.893Z",
"dateReserved": "2026-03-16T17:35:36.698Z",
"dateUpdated": "2026-03-21T03:03:09.928Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-32829",
"date": "2026-05-04",
"epss": "0.00015",
"percentile": "0.02974"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-32829\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-03-20T01:15:56.277\",\"lastModified\":\"2026-03-30T15:05:23.410\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0, decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 \\\"match copy operations,\\\" allowing out-of-bounds reads from the output buffer. The block-based API functions (`decompress_into`, `decompress_into_with_dict`, and others when `safe-decode` is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1.\"},{\"lang\":\"es\",\"value\":\"lz4_flex es una implementaci\u00f3n pura en Rust de compresi\u00f3n/descompresi\u00f3n LZ4. En las versiones 0.11.5 e inferiores, y 0.12.0, la descompresi\u00f3n de datos LZ4 no v\u00e1lidos puede filtrar informaci\u00f3n sensible de memoria no inicializada o de operaciones de descompresi\u00f3n anteriores. La biblioteca no valida correctamente los valores de desplazamiento durante las \u0027operaciones de copia de coincidencia\u0027 de LZ4, permitiendo lecturas fuera de l\u00edmites del b\u00fafer de salida. Las funciones API basadas en bloques (\u0027decompress_into\u0027, \u0027decompress_into_with_dict\u0027, y otras cuando \u0027safe-decode\u0027 est\u00e1 deshabilitado) se ven afectadas, mientras que todas las API de trama no se ven afectadas. El impacto es la exposici\u00f3n potencial de datos sensibles y secretos a trav\u00e9s de entradas LZ4 manipuladas o malformadas. Este problema ha sido solucionado en las versiones 0.11.6 y 0.12.1.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-201\"},{\"lang\":\"en\",\"value\":\"CWE-823\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pseitz:lz4_flex:*:*:*:*:*:rust:*:*\",\"versionEndExcluding\":\"0.11.6\",\"matchCriteriaId\":\"B9F4365E-174A-4CBB-9F03-34AEA5444DF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pseitz:lz4_flex:0.12.0:*:*:*:*:rust:*:*\",\"matchCriteriaId\":\"2A2078FA-C55A-49B1-933D-6D7B33BB5902\"}]}]}],\"references\":[{\"url\":\"https://github.com/PSeitz/lz4_flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/PSeitz/lz4_flex/security/advisories/GHSA-vvp9-7p8x-rfvv\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://rustsec.org/advisories/RUSTSEC-2026-0041.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-32829\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-21T03:02:22.812939Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-21T03:03:04.108Z\"}}], \"cna\": {\"title\": \"lz4_flex: Decompression can leak information from uninitialized memory or reused output buffer\", \"source\": {\"advisory\": \"GHSA-vvp9-7p8x-rfvv\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 8.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"PSeitz\", \"product\": \"lz4_flex\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 0.11.6\"}, {\"status\": \"affected\", \"version\": \"\u003e= 0.12.0, \u003c 0.12.1\"}]}], \"references\": [{\"url\": \"https://github.com/PSeitz/lz4_flex/security/advisories/GHSA-vvp9-7p8x-rfvv\", \"name\": \"https://github.com/PSeitz/lz4_flex/security/advisories/GHSA-vvp9-7p8x-rfvv\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/PSeitz/lz4_flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d\", \"name\": \"https://github.com/PSeitz/lz4_flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://rustsec.org/advisories/RUSTSEC-2026-0041.html\", \"name\": \"https://rustsec.org/advisories/RUSTSEC-2026-0041.html\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0, decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 \\\"match copy operations,\\\" allowing out-of-bounds reads from the output buffer. The block-based API functions (`decompress_into`, `decompress_into_with_dict`, and others when `safe-decode` is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-201\", \"description\": \"CWE-201: Insertion of Sensitive Information Into Sent Data\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-823\", \"description\": \"CWE-823: Use of Out-of-range Pointer Offset\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-03-20T00:49:12.893Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-32829\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-21T03:03:09.928Z\", \"dateReserved\": \"2026-03-16T17:35:36.698Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-03-20T00:49:12.893Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:11800
Vulnerability from csaf_redhat - Published: 2026-04-29 15:26 - Updated: 2026-05-04 21:14The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.
A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0, decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 "match copy operations," allowing out-of-bounds reads from the output buffer. The block-based API functions (`decompress_into`, `decompress_into_with_dict`, and others when `safe-decode` is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Logging for Red Hat OpenShift - 6.2.10",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Logging 6.2.10 is a cluster-wide logging solution for OpenShift that collects and manages applications, infrastructure, and audit logs.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11800",
"url": "https://access.redhat.com/errata/RHSA-2026:11800"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25679",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27137",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32829",
"url": "https://access.redhat.com/security/cve/CVE-2026-32829"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11800.json"
}
],
"title": "Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.2.10",
"tracking": {
"current_release_date": "2026-05-04T21:14:49+00:00",
"generator": {
"date": "2026-05-04T21:14:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:11800",
"initial_release_date": "2026-04-29T15:26:45+00:00",
"revision_history": [
{
"date": "2026-04-29T15:26:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T15:26:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-04T21:14:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Logging Subsystem for Red Hat OpenShift 6.2",
"product": {
"name": "Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:6.2::el9"
}
}
}
],
"category": "product_family",
"name": "Logging Subsystem for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3A7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776894039"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256%3A17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776897517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3Aca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800087"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3A760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800079"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3Afc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800323"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3A80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1777046400"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"product_id": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-operator-bundle@sha256%3Ada1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1777047122"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3A35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800125"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3Ab33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800128"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3A0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776894389"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3Acf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776894039"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3A328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800087"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3Ab45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800079"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3A303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800323"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3A83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1777046400"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3A5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800125"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3A0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800128"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3A662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776894389"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3A8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776894039"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3A450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800087"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3A54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800079"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3Aaff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800323"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3A892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1777046400"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3Aa7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800125"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3A7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800128"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3A4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776894389"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3A9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776894039"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3Afe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800087"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3A932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800079"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3Abec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800323"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3A454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1777046400"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3Ae0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800125"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3A04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776800128"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3Acc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging\u0026tag=1776894389"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64 as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le as a component of Logging Subsystem for Red Hat OpenShift 6.2",
"product_id": "Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le",
"relates_to_product_reference": "Logging Subsystem for Red Hat OpenShift 6.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25679",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2026-03-06T22:02:11.567841+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445356"
}
],
"notes": [
{
"category": "description",
"text": "The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/url: Incorrect parsing of IPv6 host literals in net/url",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le"
],
"known_not_affected": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25679"
},
{
"category": "external",
"summary": "RHBZ#2445356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25679"
},
{
"category": "external",
"summary": "https://go.dev/cl/752180",
"url": "https://go.dev/cl/752180"
},
{
"category": "external",
"summary": "https://go.dev/issue/77578",
"url": "https://go.dev/issue/77578"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4601",
"url": "https://pkg.go.dev/vuln/GO-2026-4601"
}
],
"release_date": "2026-03-06T21:28:14.211000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T15:26:45+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/ocp-4-18-release-notes\n\nFor Red Hat OpenShift Logging 6.2.10, see the following instructions to apply this update:\n\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_logging/6.2",
"product_ids": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11800"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net/url: Incorrect parsing of IPv6 host literals in net/url"
},
{
"cve": "CVE-2026-27137",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-03-06T22:01:38.859733+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2445345"
}
],
"notes": [
{
"category": "description",
"text": "A certificate validation flaw has been discovered in the golang crypto/x509 module. When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le"
],
"known_not_affected": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27137"
},
{
"category": "external",
"summary": "RHBZ#2445345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27137"
},
{
"category": "external",
"summary": "https://go.dev/cl/752182",
"url": "https://go.dev/cl/752182"
},
{
"category": "external",
"summary": "https://go.dev/issue/77952",
"url": "https://go.dev/issue/77952"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk",
"url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4599",
"url": "https://pkg.go.dev/vuln/GO-2026-4599"
}
],
"release_date": "2026-03-06T21:28:13.748000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T15:26:45+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/ocp-4-18-release-notes\n\nFor Red Hat OpenShift Logging 6.2.10, see the following instructions to apply this update:\n\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_logging/6.2",
"product_ids": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11800"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: Incorrect enforcement of email constraints in crypto/x509"
},
{
"cve": "CVE-2026-32829",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"discovery_date": "2026-03-16T22:05:38.553414+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2448271"
}
],
"notes": [
{
"category": "description",
"text": "lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0, decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 \"match copy operations,\" allowing out-of-bounds reads from the output buffer. The block-based API functions (`decompress_into`, `decompress_into_with_dict`, and others when `safe-decode` is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lz4_flex: lz4_flex\u0027s decompression can leak information from uninitialized memory or reused output buffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In RHEL 9 and RHEL 10, this vulnerability presents minimal risk as the rust-analyzer component operates in a \"closed loop,\" strictly decompressing its own internal database. Because it does not process external or untrusted data, exploitation requires an attacker to already possess local access and sufficient privileges to tamper with the internal cache files on disk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le"
],
"known_not_affected": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32829"
},
{
"category": "external",
"summary": "RHBZ#2448271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448271"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32829",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32829"
},
{
"category": "external",
"summary": "https://github.com/PSeitz/lz4_flex",
"url": "https://github.com/PSeitz/lz4_flex"
},
{
"category": "external",
"summary": "https://github.com/PSeitz/lz4_flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d",
"url": "https://github.com/PSeitz/lz4_flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d"
},
{
"category": "external",
"summary": "https://github.com/PSeitz/lz4_flex/security/advisories/GHSA-vvp9-7p8x-rfvv",
"url": "https://github.com/PSeitz/lz4_flex/security/advisories/GHSA-vvp9-7p8x-rfvv"
}
],
"release_date": "2026-03-16T20:48:08+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T15:26:45+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/ocp-4-18-release-notes\n\nFor Red Hat OpenShift Logging 6.2.10, see the following instructions to apply this update:\n\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_logging/6.2",
"product_ids": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11800"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:17353255c31e79c2ec45de5367019e0fb30570a1cc3cff6be170199eeb18e4dc_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:7fd22572f12bbc2029f24eb623eb814747500b436c1c9d303fe7c6e875006000_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:8f625e3b3961e05ded9032076f88bfa4bdbb6dc5d64bb4a9a03284cc64ade3da_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:9a0ebc5fb636a3eb613eba828db0a52f95582533a15c121b01346fb55d335b49_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:cf63b1d43e799bf2fccf11c2f5ff1e8dabd407a4ed3174ebceb91a7b15ea33d8_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:328340d4d482b06ab444f435aeb9c2a43ac7177ecd1ab8eec297c56aa6467203_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:450a1302db3b38b2f63645dccd1d992a4b61e42fb375f49cd62d2af292fb54ac_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:ca54850f60fc615b3ff7f04399173853722a42845e9a7ebae5c50e9659eab90e_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:fe6e806f9e3dcfdf75897f769bd0ddca5d6f2333bf8d7109a8883c55f1473273_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:54e5b1a076008e32574ddff8fc3a3ea9aa8cfb3c2ba2d2736c39906f15b1350d_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:760d23df05d5ed4a370401c5bc0485ba9479312ef6628445995bfa4710b0b18b_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:932962c0efa367e1b09b66deda20d58093321e376efb4fc8a99cae97854cf71b_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b45be7ff7e4e9dd659de7573c01d22db97341e7b12a2306e35b0ed0db5c1b966_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:303dbc8494a46ed4eb24a4e6ee503a5f3e791bbcd45af2576e111855514c17a9_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:aff23731ba90a17219df3a56a571904ac9267c43f6def4d049236d152b704254_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:bec80cde1b5262108ffa3c684a81d090de850114a68d049c651a6d05542b7468_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:fc0dee9a5f93e89a7225149766f1976cb67be1459456c9367dba48c3df3dad36_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:da1df9b6504750ba6c7b2187c3f4cfe9e8da8bdd32daa3fd1f7b84cc285c6394_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:454bdee681a24666732fc98764d799f54446031730e408648397713f58d73c7a_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:80679c65e340cced2aca6458ecfbe04f85171e0c066a39e93d44e38e444daeb1_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:83f22ad20ad1e6c123a4f26de43095274fa4fd55d396b3bb5f74f8e2b73b01ee_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:892c5dcdf43882b275d59c7997cddff4a319394327ea7b5d16a074c70d7fe059_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:35b016e136391b2377744cfaffdf5ea5a0bfb5cd83a24003d1f4468859520693_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5eea261a9be54be482073d8f58ac09e599d7bb0a01255e0966a1a34b9b306788_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a7c2417f3fd6e2e421a9551b061d90badbe0b7971282ab002d71cccd8c3bc739_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:e0ae5996726af5675dc84217f220fd12c5c7a3af069ae0a5e0c985aa1efc40b9_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:0301de23e37b680cfb4f7c7b737303f1564b5a947282590ad32c521834b0453f_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:04b6062eedba3c57e099187cb627186f34f48a09df81576bbea7ac2a3e57936e_ppc64le",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:7d3c287d9ac66d905624f5aefc5fe9eeadbff7868c1c31832aff74a8a0673216_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:b33fa7578442868a978b18d9219b9deef2d30978b3788051dc7c86989f260a85_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:0f703f41cee495656dcadaa90199357d748c39d56fd3d6399593337f4912dbe6_amd64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:4898ca8913283a0f681bbadb88b6e568c2e94a11b2087301b4ad9075f6a1ac59_s390x",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:662a7b86e69fd80fb0af5acb48ced5d889a8892548a995c7c2d6dfbf70495589_arm64",
"Logging Subsystem for Red Hat OpenShift 6.2:registry.redhat.io/openshift-logging/vector-rhel9@sha256:cc059bf2fb6382711eb55bae8cd61e5b69304f97758ce073bc0de915a531f6cd_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lz4_flex: lz4_flex\u0027s decompression can leak information from uninitialized memory or reused output buffer"
}
]
}
rustsec-2026-0041
Vulnerability from osv_rustsec
Decompressing invalid LZ4 data with the block API can leak data from uninitialized memory, or leak content from previous decompression operations when reusing an output buffer.
The LZ4 block format defines a "match copy operation" which duplicates previously written
data or data from a user-supplied dict. The position of that data is defined by an offset.
lz4_flex did not properly validate offset values, causing it to copy data from outside
the initialized portion of the output buffer.
Two scenarios are affected:
- Decompressing with the
unsafeimplementation (safe-decodefeature flag disabled, which is the default): can leak content of uninitialized memory as part of the decompressed result. - Decompressing into a reused, user-supplied output buffer (also affects
safe-decode): can leak the previous contents of the output buffer as part of the decompressed result.
Only the block-based APIs are affected. All frame APIs are unaffected.
The flaw was corrected in versions 0.11.6 and 0.12.1 by properly validating offset values during decompression.
If upgrading is not possible, the issue can be mitigated by zeroing the output buffer before
each call to the affected functions and enabling the safe-decode feature flag.
| URL | Type | |
|---|---|---|
{
"affected": [
{
"database_specific": {
"categories": [
"memory-exposure"
],
"cvss": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [
"lz4_flex::block::decompress",
"lz4_flex::block::decompress_into",
"lz4_flex::block::decompress_into_with_dict",
"lz4_flex::block::decompress_size_prepended",
"lz4_flex::block::decompress_size_prepended_with_dict",
"lz4_flex::block::decompress_with_dict"
],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "lz4_flex",
"purl": "pkg:cargo/lz4_flex"
},
"ranges": [
{
"events": [
{
"introduced": "0.0.0-0"
},
{
"fixed": "0.11.6"
},
{
"introduced": "0.12.0"
},
{
"fixed": "0.12.1"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2026-32829",
"GHSA-vvp9-7p8x-rfvv"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "Decompressing invalid LZ4 data with the block API can leak data from uninitialized memory,\nor leak content from previous decompression operations when reusing an output buffer.\n\nThe LZ4 block format defines a \"match copy operation\" which duplicates previously written\ndata or data from a user-supplied dict. The position of that data is defined by an _offset_.\n`lz4_flex` did not properly validate _offset_ values, causing it to copy data from outside\nthe initialized portion of the output buffer.\n\nTwo scenarios are affected:\n\n- Decompressing with the `unsafe` implementation (`safe-decode` feature flag disabled, which\n is the default): can leak content of uninitialized memory as part of the decompressed result.\n- Decompressing into a reused, user-supplied output buffer (also affects `safe-decode`): can\n leak the previous contents of the output buffer as part of the decompressed result.\n\nOnly the block-based APIs are affected. All frame APIs are unaffected.\n\nThe flaw was corrected in versions 0.11.6 and 0.12.1 by properly validating offset values\nduring decompression.\n\nIf upgrading is not possible, the issue can be mitigated by zeroing the output buffer before\neach call to the affected functions and enabling the `safe-decode` feature flag.",
"id": "RUSTSEC-2026-0041",
"modified": "2026-03-17T16:08:45Z",
"published": "2026-03-17T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/lz4_flex"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0041.html"
}
],
"related": [],
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Decompressing invalid data can leak information from uninitialized memory or reused output buffer"
}
FKIE_CVE-2026-32829
Vulnerability from fkie_nvd - Published: 2026-03-20 01:15 - Updated: 2026-03-30 15:05| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/PSeitz/lz4_flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d | Patch | |
| security-advisories@github.com | https://github.com/PSeitz/lz4_flex/security/advisories/GHSA-vvp9-7p8x-rfvv | Mitigation, Vendor Advisory | |
| security-advisories@github.com | https://rustsec.org/advisories/RUSTSEC-2026-0041.html | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pseitz:lz4_flex:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "B9F4365E-174A-4CBB-9F03-34AEA5444DF8",
"versionEndExcluding": "0.11.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pseitz:lz4_flex:0.12.0:*:*:*:*:rust:*:*",
"matchCriteriaId": "2A2078FA-C55A-49B1-933D-6D7B33BB5902",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0, decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 \"match copy operations,\" allowing out-of-bounds reads from the output buffer. The block-based API functions (`decompress_into`, `decompress_into_with_dict`, and others when `safe-decode` is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1."
},
{
"lang": "es",
"value": "lz4_flex es una implementaci\u00f3n pura en Rust de compresi\u00f3n/descompresi\u00f3n LZ4. En las versiones 0.11.5 e inferiores, y 0.12.0, la descompresi\u00f3n de datos LZ4 no v\u00e1lidos puede filtrar informaci\u00f3n sensible de memoria no inicializada o de operaciones de descompresi\u00f3n anteriores. La biblioteca no valida correctamente los valores de desplazamiento durante las \u0027operaciones de copia de coincidencia\u0027 de LZ4, permitiendo lecturas fuera de l\u00edmites del b\u00fafer de salida. Las funciones API basadas en bloques (\u0027decompress_into\u0027, \u0027decompress_into_with_dict\u0027, y otras cuando \u0027safe-decode\u0027 est\u00e1 deshabilitado) se ven afectadas, mientras que todas las API de trama no se ven afectadas. El impacto es la exposici\u00f3n potencial de datos sensibles y secretos a trav\u00e9s de entradas LZ4 manipuladas o malformadas. Este problema ha sido solucionado en las versiones 0.11.6 y 0.12.1."
}
],
"id": "CVE-2026-32829",
"lastModified": "2026-03-30T15:05:23.410",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-03-20T01:15:56.277",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/PSeitz/lz4_flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/PSeitz/lz4_flex/security/advisories/GHSA-vvp9-7p8x-rfvv"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0041.html"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-201"
},
{
"lang": "en",
"value": "CWE-823"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
GHSA-VVP9-7P8X-RFVV
Vulnerability from github – Published: 2026-03-16 20:48 – Updated: 2026-03-20 21:18Summary
Decompressing invalid LZ4 data can leak data from uninitialized memory, or can leak content from previous decompression operations when reusing an output buffer.
Details
The LZ4 block format defines a "match copy operation" which duplicates previously written data or data from the user-supplied dict. The position of that data is defined by an offset. The data is copied within the output buffer from the offset to the current output position. However, lz4_flex did not properly detect invalid and out-of-bounds offset values properly, causing it to copy uninitialized data from the output buffer.
Only the block based API functions are affected:
lz4_flex::block::{decompress_into, decompress_into_with_dict}
When safe-decode is disabled additionally these functions are affected
lz4_flex::block::{decompress, decompress_with_dict, decompress_size_prepended, decompress_size_prepended_with_dict}
All frame APIs are not affected.
There are two affected use cases:
- decompressing LZ4 data with the unsafe implementation (safe-decode feature flag disabled, which is enabled by default):
can leak content of uninitialized memory as decompressed result
- decompressing LZ4 data into a reused, user-supplied output buffer (affects the safe-decode feature as well):
can leak the previous contents of the output buffer as decompressed result
Impact
Leakage of data from uninitialized memory or content from previous decompression operations, possibly revealing sensitive information and secrets.
Mitigation
lz4_flex 0.12.1 and 0.11.6 fixes this issue without requiring changes in user code.
If you cannot upgrade, you can mitigate this vulnerability by zeroing the output buffer before calling block::decompress_into or block::decompress_into_with_dict (only block based API is affected, frame API is not affected). Additionally the the safe-decode feature flag should be enabled.
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "lz4_flex"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.11.6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "crates.io",
"name": "lz4_flex"
},
"ranges": [
{
"events": [
{
"introduced": "0.12.0"
},
{
"fixed": "0.12.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-32829"
],
"database_specific": {
"cwe_ids": [
"CWE-201",
"CWE-823"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-16T20:48:08Z",
"nvd_published_at": "2026-03-20T01:15:56Z",
"severity": "HIGH"
},
"details": "### Summary\nDecompressing invalid LZ4 data can leak data from uninitialized memory, or can leak content from previous decompression operations when reusing an output buffer.\n\n### Details\nThe LZ4 block format defines a \"match copy operation\" which duplicates previously written data or data from the user-supplied dict. The position of that data is defined by an _offset_. The data is copied within the output buffer from the _offset_ to the current output position.\nHowever, lz4_flex did not properly detect invalid and out-of-bounds _offset_ values properly, causing it to copy uninitialized data from the output buffer.\n\nOnly the block based API functions are affected: \n`lz4_flex::block::{decompress_into, decompress_into_with_dict}`\n\nWhen safe-decode is disabled _additionally_ these functions are affected\n`lz4_flex::block::{decompress, decompress_with_dict, decompress_size_prepended, decompress_size_prepended_with_dict}`\n\nAll `frame` APIs are _not_ affected.\n\nThere are two affected use cases:\n- decompressing LZ4 data with the `unsafe` implementation (`safe-decode` feature flag disabled, which is enabled by default):\ncan leak content of uninitialized memory as decompressed result\n- decompressing LZ4 data into a reused, user-supplied `output` buffer (affects the `safe-decode` feature as well):\ncan leak the previous contents of the output buffer as decompressed result\n\n### Impact\nLeakage of data from uninitialized memory or content from previous decompression operations, possibly revealing sensitive information and secrets.\n\n### Mitigation\nlz4_flex 0.12.1 and 0.11.6 fixes this issue without requiring changes in user code.\n\nIf you cannot upgrade, you can mitigate this vulnerability by zeroing the output buffer before calling `block::decompress_into` or `block::decompress_into_with_dict` (only block based API is affected, frame API is not affected). Additionally the the `safe-decode` feature flag should be enabled.",
"id": "GHSA-vvp9-7p8x-rfvv",
"modified": "2026-03-20T21:18:54Z",
"published": "2026-03-16T20:48:08Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/PSeitz/lz4_flex/security/advisories/GHSA-vvp9-7p8x-rfvv"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32829"
},
{
"type": "WEB",
"url": "https://github.com/PSeitz/lz4_flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d"
},
{
"type": "PACKAGE",
"url": "https://github.com/PSeitz/lz4_flex"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0041.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "lz4_flex\u0027s decompression can leak information from uninitialized memory or reused output buffer"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.