{"@context":"https://openvex.dev/ns/v0.2.0","@id":"pkg:docker/operator@1.18.0","author":"security@datadoghq.com","author_role":"Vulnerability Management","last_updated":"2026-05-14T11:46:34.266773557Z","statements":[{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.739043Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.739043Z","products":[{"@id":"pkg:rpm/redhat/coreutils-single@8.32-39.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=coreutils-8.32-39.el9.src.rpm"},{"@id":"pkg:rpm/redhat/coreutils-single@8.32-39.el9?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=coreutils-8.32-39.el9.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.739042Z","vulnerability":{"name":"CVE-2025-5278"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.739087Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.739087Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.739087Z","vulnerability":{"name":"CVE-2026-39820"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.73914Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.73914Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.73914Z","vulnerability":{"name":"CVE-2026-4437"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.7392Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.7392Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.7392Z","vulnerability":{"name":"CVE-2026-4046"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.740017Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.740016Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.740016Z","vulnerability":{"name":"CVE-2026-5435"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.740155Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.740155Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.740155Z","vulnerability":{"name":"CVE-2026-5450"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.740444Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.740444Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.740444Z","vulnerability":{"name":"CVE-2026-5928"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.740608Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.740608Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.740608Z","vulnerability":{"name":"CVE-2026-42499"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.740948Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.740948Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.740948Z","vulnerability":{"name":"CVE-2026-33814"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.741226Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.741226Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.741225Z","vulnerability":{"name":"CVE-2026-39836"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.741378Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.741378Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.741378Z","vulnerability":{"name":"CVE-2026-4438"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.741737Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.741737Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.741737Z","vulnerability":{"name":"CVE-2026-33811"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.74229Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.74229Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.74229Z","vulnerability":{"name":"CVE-2026-39826"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.742381Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.742381Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.742381Z","vulnerability":{"name":"CVE-2026-39817"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.742443Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.742443Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.742443Z","vulnerability":{"name":"CVE-2026-42501"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.742504Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.742504Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.742504Z","vulnerability":{"name":"CVE-2026-39825"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.742775Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.742775Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.742775Z","vulnerability":{"name":"CVE-2026-39823"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:15:14.743621Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:15:14.743621Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"under_investigation","timestamp":"2026-05-14T10:15:14.743621Z","vulnerability":{"name":"CVE-2026-39819"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:03.12633Z","products":[{"@id":"pkg:rpm/redhat/ncurses-base@6.2-10.20210508.el9_6.2?arch=noarch\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm"},{"@id":"pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm"},{"@id":"pkg:rpm/redhat/ncurses-libs@6.2-10.20210508.el9_6.2?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=ncurses-6.2-10.20210508.el9_6.2.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:15:14.740382Z","vulnerability":{"name":"CVE-2023-50495"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:03.12644Z","products":[{"@id":"pkg:rpm/redhat/libgcc@11.5.0-5.el9_5?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=gcc-11.5.0-5.el9_5.src.rpm"},{"@id":"pkg:rpm/redhat/libgcc@11.5.0-5.el9_5?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=gcc-11.5.0-5.el9_5.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:15:14.740663Z","vulnerability":{"name":"CVE-2022-27943"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:03.12646Z","products":[{"@id":"pkg:rpm/redhat/pcre2@10.40-6.el9?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=pcre2-10.40-6.el9.src.rpm"},{"@id":"pkg:rpm/redhat/pcre2-syntax@10.40-6.el9?arch=noarch\u0026distro=rhel-9.6\u0026upstream=pcre2-10.40-6.el9.src.rpm"},{"@id":"pkg:rpm/redhat/pcre2@10.40-6.el9?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=pcre2-10.40-6.el9.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:15:14.74071Z","vulnerability":{"name":"CVE-2022-41409"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:03.126674Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.741052Z","vulnerability":{"name":"CVE-2026-27143"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:03.126688Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.741434Z","vulnerability":{"name":"CVE-2026-32281"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:03.126695Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.741475Z","vulnerability":{"name":"CVE-2026-32280"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:03.126785Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.74152Z","vulnerability":{"name":"CVE-2026-32283"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:03.127004Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.741828Z","vulnerability":{"name":"CVE-2026-27140"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"This vulnerability is not exploitable in our environment, as the affected function is not used by the application. The binary does not link against or invoke the vulnerable component (cap_set_file function).","justification":"vulnerable_code_not_present","last_updated":"2026-05-14T11:29:03.12718Z","products":[{"@id":"pkg:rpm/redhat/libcap@2.48-9.el9_2?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=libcap-2.48-9.el9_2.src.rpm"},{"@id":"pkg:rpm/redhat/libcap@2.48-9.el9_2?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=libcap-2.48-9.el9_2.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:15:14.74293Z","vulnerability":{"name":"CVE-2026-4878"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"The vulnerability exploits the BSD-specific kenv command in the OpenTelemetry Go SDK resource detection. This code is gated by Go OS build constraints and is only compiled on BSD/Solaris targets. The operator binary is built with GOOS=linux, so the vulnerable code is excluded from the compiled binary and is not present in the image.","justification":"vulnerable_code_not_present","last_updated":"2026-05-14T11:29:03.12719Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel/sdk@v1.33.0"}],"status":"affected","timestamp":"2026-05-14T10:15:14.743011Z","vulnerability":{"name":"CVE-2026-39883"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:03.127194Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.743109Z","vulnerability":{"name":"CVE-2026-32289"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:03.127198Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.74342Z","vulnerability":{"name":"CVE-2026-32282"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:03.127203Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.743573Z","vulnerability":{"name":"CVE-2026-27144"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:03.127226Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.743665Z","vulnerability":{"name":"CVE-2026-32288"}},{"action_statement":"This vulnerability was fixed in: 1.25.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:15.88536Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.739387Z","vulnerability":{"name":"CVE-2026-25679"}},{"action_statement":"This vulnerability was fixed in: 1.25.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:15.885513Z","products":[{"@id":"pkg:golang/google.golang.org/grpc@v1.69.4"}],"status":"affected","timestamp":"2026-05-14T10:15:14.741012Z","vulnerability":{"name":"CVE-2026-33186"}},{"action_statement":"This vulnerability was fixed in: 1.25.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:15.885529Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.742883Z","vulnerability":{"name":"CVE-2026-27142"}},{"action_statement":"This vulnerability was fixed in: 1.25.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:15.885536Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.743726Z","vulnerability":{"name":"CVE-2026-27139"}},{"action_statement":"This vulnerability was fixed in: 1.24.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:09:41.156592Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:15:14.739506Z","vulnerability":{"name":"CVE-2025-15281"}},{"action_statement":"This vulnerability was fixed in: 1.24.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:09:41.156625Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:15:14.742001Z","vulnerability":{"name":"CVE-2026-0915"}},{"action_statement":"This vulnerability was fixed in: 1.24.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:09:41.156632Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel/sdk@v1.33.0"}],"status":"affected","timestamp":"2026-05-14T10:15:14.742208Z","vulnerability":{"name":"CVE-2026-24051"}},{"action_statement":"This vulnerability was fixed in: 1.24.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:09:41.156641Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=x86_64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-168.el9_6.23?arch=aarch64\u0026distro=rhel-9.6\u0026upstream=glibc-2.34-168.el9_6.23.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:15:14.743215Z","vulnerability":{"name":"CVE-2026-0861"}},{"action_statement":"This vulnerability was fixed in: 1.23.1","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:06:18.401959Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.741288Z","vulnerability":{"name":"CVE-2025-68121"}},{"action_statement":"This vulnerability was fixed in: 1.23.1","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:06:18.401998Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.743169Z","vulnerability":{"name":"CVE-2025-61732"}},{"action_statement":"This vulnerability was fixed in: 1.23.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:59:31.788082Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.739871Z","vulnerability":{"name":"CVE-2025-61726"}},{"action_statement":"This vulnerability was fixed in: 1.23.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:59:31.788162Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.741914Z","vulnerability":{"name":"CVE-2025-61728"}},{"action_statement":"This vulnerability was fixed in: 1.23.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:59:31.78817Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.742833Z","vulnerability":{"name":"CVE-2025-61731"}},{"action_statement":"This vulnerability was fixed in: 1.23.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:59:31.788177Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.743487Z","vulnerability":{"name":"CVE-2025-61730"}},{"action_statement":"This vulnerability was fixed in: 1.21.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:44:25.931563Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.741786Z","vulnerability":{"name":"CVE-2025-61729"}},{"action_statement":"This vulnerability was fixed in: 1.21.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:44:25.931602Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.743531Z","vulnerability":{"name":"CVE-2025-61727"}},{"action_statement":"This vulnerability was fixed in: 1.20.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:34:59.528754Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.73963Z","vulnerability":{"name":"CVE-2025-61725"}},{"action_statement":"This vulnerability was fixed in: 1.20.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:34:59.528779Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.739768Z","vulnerability":{"name":"CVE-2025-61723"}},{"action_statement":"This vulnerability was fixed in: 1.20.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:34:59.528785Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.740864Z","vulnerability":{"name":"CVE-2025-58186"}},{"action_statement":"This vulnerability was fixed in: 1.20.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:34:59.528791Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.741334Z","vulnerability":{"name":"CVE-2025-58185"}},{"action_statement":"This vulnerability was fixed in: 1.20.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:34:59.528795Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.741674Z","vulnerability":{"name":"CVE-2025-58187"}},{"action_statement":"This vulnerability was fixed in: 1.20.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:34:59.528799Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.74187Z","vulnerability":{"name":"CVE-2025-47912"}},{"action_statement":"This vulnerability was fixed in: 1.20.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:34:59.528802Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.741957Z","vulnerability":{"name":"CVE-2025-61724"}},{"action_statement":"This vulnerability was fixed in: 1.20.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:34:59.528809Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.742588Z","vulnerability":{"name":"CVE-2025-58189"}},{"action_statement":"This vulnerability was fixed in: 1.20.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:34:59.528812Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.742648Z","vulnerability":{"name":"CVE-2025-58183"}},{"action_statement":"This vulnerability was fixed in: 1.20.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:34:59.528816Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"affected","timestamp":"2026-05-14T10:15:14.742976Z","vulnerability":{"name":"CVE-2025-58188"}}],"timestamp":"2026-03-12T17:45:43.509658636Z","tooling":"","version":18}