RHSA-2026:10131
Vulnerability from csaf_redhat - Published: 2026-04-23 12:17 - Updated: 2026-05-02 03:25No description is available for this CVE.
A flaw was found in lodash. The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink. Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().
A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The 1.3.4 release of Red Hat Trusted Artifact Signer OpenShift Operator.\nFor more details please visit the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"title": "Topic"
},
{
"category": "general",
"text": "The RHTAS Operator can be used with OpenShift Container Platform 4.16, 4.17, 4.18, 4.19, 4.20 and 4.21",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10131",
"url": "https://access.redhat.com/errata/RHSA-2026:10131"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33186",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4427",
"url": "https://access.redhat.com/security/cve/CVE-2026-4427"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4800",
"url": "https://access.redhat.com/security/cve/CVE-2026-4800"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10131.json"
}
],
"title": "Red Hat Security Advisory: RHTAS 1.3.4 - Red Hat Trusted Artifact Signer Release",
"tracking": {
"current_release_date": "2026-05-02T03:25:46+00:00",
"generator": {
"date": "2026-05-02T03:25:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:10131",
"initial_release_date": "2026-04-23T12:17:52+00:00",
"revision_history": [
{
"date": "2026-04-23T12:17:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-23T12:18:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-02T03:25:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Trusted Artifact Signer 1.3",
"product": {
"name": "Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:trusted_artifact_signer:1.3::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Trusted Artifact Signer"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"product_id": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rekor-backfill-redis-rhel9@sha256%3A35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1776243545"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"product": {
"name": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"product_id": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/certificate-transparency-rhel9@sha256%3A95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1776243215"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"product": {
"name": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"product_id": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/trillian-database-rhel9@sha256%3Aab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1776243434"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"product": {
"name": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"product_id": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fulcio-rhel9@sha256%3A2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1776242801"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"product": {
"name": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"product_id": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/trillian-logserver-rhel9@sha256%3A523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1776243434"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64",
"product": {
"name": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64",
"product_id": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64",
"product_identification_helper": {
"purl": "pkg:oci/trillian-logsigner-rhel9@sha256%3Af211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1776243434"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64",
"product": {
"name": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64",
"product_id": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/trillian-redis-rhel9@sha256%3A22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1776243434"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64",
"product_id": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rekor-search-ui-rhel9@sha256%3A204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1776330093"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"product": {
"name": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"product_id": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rekor-server-rhel9@sha256%3Ab4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1776243545"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"product": {
"name": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"product_id": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/timestamp-authority-rhel9@sha256%3Aa4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed?arch=amd64\u0026repository_url=registry.redhat.io/rhtas\u0026tag=1776242867"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64"
},
"product_reference": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64"
},
"product_reference": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64"
},
"product_reference": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64"
},
"product_reference": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64"
},
"product_reference": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64"
},
"product_reference": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64"
},
"product_reference": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64 as a component of Red Hat Trusted Artifact Signer 1.3",
"product_id": "Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64"
},
"product_reference": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64",
"relates_to_product_reference": "Red Hat Trusted Artifact Signer 1.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-4427",
"discovery_date": "2026-03-18T14:02:19.414820+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64"
]
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "other",
"text": "This CVE has been marked as Rejected by the assigning CNA.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4427",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4427"
}
],
"release_date": "2026-03-18T13:00:31+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T12:17:52+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10131"
}
],
"title": "github.com/jackc/pgproto3: pgproto3: Denial of Service via negative field length in DataRow message"
},
{
"cve": "CVE-2026-4800",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2026-03-31T20:01:21.918257+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453496"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in lodash. The fix for CVE-2021-23337 added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink. Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: lodash: Arbitrary code execution via untrusted input in template imports",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the context of Red Hat Enterprise Linux, the grafana and grafana-pcp packages execute the affected JavaScript entirely client-side within the user\u0027s browser. Consequently, the attack surface is strictly restricted to the local browser environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4800"
},
{
"category": "external",
"summary": "RHBZ#2453496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4800",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4800"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4800"
},
{
"category": "external",
"summary": "https://cna.openjsf.org/security-advisories.html",
"url": "https://cna.openjsf.org/security-advisories.html"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-35jh-r3h4-6jhm",
"url": "https://github.com/advisories/GHSA-35jh-r3h4-6jhm"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c",
"url": "https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c"
}
],
"release_date": "2026-03-31T19:25:55.987000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T12:17:52+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10131"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: lodash: Arbitrary code execution via untrusted input in template imports"
},
{
"cve": "CVE-2026-33186",
"cwe": {
"id": "CWE-551",
"name": "Incorrect Behavior Order: Authorization Before Parsing and Canonicalization"
},
"discovery_date": "2026-03-20T23:02:27.802640+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449833"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in gRPC-Go, the Go language implementation of gRPC. This vulnerability, an authorization bypass, is caused by improper input validation of the HTTP/2 `:path` pseudo-header. A remote attacker can exploit this by sending raw HTTP/2 frames with a malformed `:path` that omits the mandatory leading slash. This allows the attacker to bypass defined security policies, potentially leading to unauthorized access to services or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64"
],
"known_not_affected": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33186"
},
{
"category": "external",
"summary": "RHBZ#2449833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449833"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33186"
},
{
"category": "external",
"summary": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3",
"url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3"
}
],
"release_date": "2026-03-20T22:23:32.147000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-23T12:17:52+00:00",
"details": "Red Hat Trusted Artifact Signer simplifies cryptographic signing and verifying of software artifacts such as container images, binaries and source code changes. It is a self-managed on-premise deployment of the Sigstore project available at https://sigstore.dev\n\nPlatform Engineers, Software Developers and Security Professionals may use RHTAS to ensure the integrity, transparency and assurance of their organization\u0027s software supply chain.\n\nFor details on using the operator, refer to the product documentation at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3\n\nYou can find the release notes for this version of Red Hat Trusted Artifact Signer at https://access.redhat.com/documentation/en-us/red_hat_trusted_artifact_signer/1.3/html-single/release_notes/index",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10131"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement infrastructure-level normalization to ensure all incoming HTTP/2 `:path` headers are properly formatted with a leading slash before reaching the gRPC-Go server. This can be achieved by configuring a reverse proxy or API gateway to validate and normalize the `:path` header. Ensure that any such intermediary is properly configured and restarted to apply the changes, which may temporarily impact service availability.",
"product_ids": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:95b5aefafd17dd44794f6d5d1e75278faa5a74f2472db667409d1c88caaef1f1_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/fulcio-rhel9@sha256:2d478c389bc89afc6b331bc662a84dfc1bbb9da2681ab6dc5ad36f44c346699a_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:35b00d6cc82f90b4577af0d2c15153e255d6bb946349bb85f175216cefad1d07_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:204dc28f6182267851d39eff08649e921877e2771d2c39acb798aa7896f5bcef_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/rekor-server-rhel9@sha256:b4a5a2c2518dba5f7812c8b4112e25a0f867a4b187c23adfc727395f871c8ca6_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:a4aae20d4d24fc780fd7f613a54c6587538007b23e2a84b826c6812a19abd9ed_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-database-rhel9@sha256:ab5c3e921b58d17bf6b596d2d7acf64a28b34f3f3a66720c1a07e6555ed9e0b8_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:523fa259ebf067ac3076748d4f5c86e01e5b1960034c0876add5d67b0ca21b0b_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:f211db01228530de8ed46b05189c492e6c3629df1098da57d31f2765a22ef014_amd64",
"Red Hat Trusted Artifact Signer 1.3:registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:22b8cfd123fdd66827b81f2431903198e33579906102b2f6295276cf3eb197a6_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.