{"@context":"https://openvex.dev/ns/v0.2.0","@id":"pkg:docker/operator@1.20.0","author":"security@datadoghq.com","author_role":"Vulnerability Management","last_updated":"2026-05-14T11:46:31.362908542Z","statements":[{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.86643Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.86643Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.86643Z","vulnerability":{"name":"CVE-2026-33811"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.866887Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.866887Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.866887Z","vulnerability":{"name":"CVE-2026-39826"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.86694Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.86694Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.86694Z","vulnerability":{"name":"CVE-2026-39817"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.866081Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.866081Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.866081Z","vulnerability":{"name":"CVE-2026-39836"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.866205Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.866205Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.866205Z","vulnerability":{"name":"CVE-2026-4438"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.866982Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.866982Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.866982Z","vulnerability":{"name":"CVE-2026-42501"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.867019Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.867018Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.867018Z","vulnerability":{"name":"CVE-2026-39825"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.86707Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.86707Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.86707Z","vulnerability":{"name":"CVE-2026-39823"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:36.41604Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.866318Z","vulnerability":{"name":"CVE-2026-32280"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.865057Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.865057Z","products":[{"@id":"pkg:rpm/redhat/coreutils-single@8.32-39.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=coreutils-8.32-39.el9.src.rpm"},{"@id":"pkg:rpm/redhat/coreutils-single@8.32-39.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=coreutils-8.32-39.el9.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.865057Z","vulnerability":{"name":"CVE-2025-5278"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.865121Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.86512Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.86512Z","vulnerability":{"name":"CVE-2026-39820"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.865189Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.865188Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.865188Z","vulnerability":{"name":"CVE-2026-4437"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.865245Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.865245Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.865245Z","vulnerability":{"name":"CVE-2026-4046"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.86554Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.86554Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.86554Z","vulnerability":{"name":"CVE-2026-5435"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.86562Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.86562Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.86562Z","vulnerability":{"name":"CVE-2026-5450"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.865748Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.865748Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.865747Z","vulnerability":{"name":"CVE-2026-5928"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.865809Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.865808Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.865808Z","vulnerability":{"name":"CVE-2026-42499"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.86596Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.86596Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.86596Z","vulnerability":{"name":"CVE-2026-33814"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T10:37:16.867861Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.867861Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"under_investigation","timestamp":"2026-05-14T10:37:16.86786Z","vulnerability":{"name":"CVE-2026-39819"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.898628Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"fixed","timestamp":"2026-05-14T10:37:16.898628Z","vulnerability":{"name":"CVE-2025-61725"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.898691Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"fixed","timestamp":"2026-05-14T10:37:16.898691Z","vulnerability":{"name":"CVE-2025-61723"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.898961Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"fixed","timestamp":"2026-05-14T10:37:16.89896Z","vulnerability":{"name":"CVE-2025-58186"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.899037Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"fixed","timestamp":"2026-05-14T10:37:16.899037Z","vulnerability":{"name":"CVE-2025-58185"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.89905Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"fixed","timestamp":"2026-05-14T10:37:16.89905Z","vulnerability":{"name":"CVE-2025-58187"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.899057Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"fixed","timestamp":"2026-05-14T10:37:16.899056Z","vulnerability":{"name":"CVE-2025-47912"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.899065Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"fixed","timestamp":"2026-05-14T10:37:16.899064Z","vulnerability":{"name":"CVE-2025-61724"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.89907Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"fixed","timestamp":"2026-05-14T10:37:16.89907Z","vulnerability":{"name":"CVE-2025-58189"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.899073Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"fixed","timestamp":"2026-05-14T10:37:16.899073Z","vulnerability":{"name":"CVE-2025-58183"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:37:16.899079Z","products":[{"@id":"pkg:golang/stdlib@1.24.6"}],"status":"fixed","timestamp":"2026-05-14T10:37:16.899079Z","vulnerability":{"name":"CVE-2025-58188"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"This vulnerability is not exploitable in our environment, as the affected function is not used by the application. The binary does not link against or invoke the vulnerable component (cap_set_file function).","justification":"vulnerable_code_not_present","last_updated":"2026-05-14T11:32:36.416057Z","products":[{"@id":"pkg:rpm/redhat/libcap@2.48-10.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=libcap-2.48-10.el9.src.rpm"},{"@id":"pkg:rpm/redhat/libcap@2.48-10.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=libcap-2.48-10.el9.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:37:16.867327Z","vulnerability":{"name":"CVE-2026-4878"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"The vulnerability exploits the BSD-specific kenv command in the OpenTelemetry Go SDK resource detection. This code is gated by Go OS build constraints and is only compiled on BSD/Solaris targets. The operator binary is built with GOOS=linux, so the vulnerable code is excluded from the compiled binary and is not present in the image.","justification":"vulnerable_code_not_present","last_updated":"2026-05-14T11:32:36.416061Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel/sdk@v1.33.0"}],"status":"affected","timestamp":"2026-05-14T10:37:16.867346Z","vulnerability":{"name":"CVE-2026-39883"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:36.416064Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.867441Z","vulnerability":{"name":"CVE-2026-32289"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:36.416069Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.867653Z","vulnerability":{"name":"CVE-2026-32282"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:36.416073Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.867818Z","vulnerability":{"name":"CVE-2026-27144"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:36.416076Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.867901Z","vulnerability":{"name":"CVE-2026-32288"}},{"action_statement":"This vulnerability was fixed in: 1.25.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:23:45.053166Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.867938Z","vulnerability":{"name":"CVE-2026-27139"}},{"action_statement":"This vulnerability was fixed in: 1.24.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:16:38.945576Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:37:16.867591Z","vulnerability":{"name":"CVE-2026-0861"}},{"action_statement":"This vulnerability was fixed in: 1.23.1","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:06:21.063138Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.86752Z","vulnerability":{"name":"CVE-2025-61732"}},{"action_statement":"This vulnerability was fixed in: 1.23.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:59:57.119482Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.86773Z","vulnerability":{"name":"CVE-2025-61730"}},{"action_statement":"This vulnerability was fixed in: 1.21.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:46:15.4192Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.867775Z","vulnerability":{"name":"CVE-2025-61727"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:36.416005Z","products":[{"@id":"pkg:rpm/redhat/ncurses-base@6.2-12.20210508.el9?arch=noarch\u0026distro=rhel-9.7\u0026upstream=ncurses-6.2-12.20210508.el9.src.rpm"},{"@id":"pkg:rpm/redhat/ncurses-libs@6.2-12.20210508.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=ncurses-6.2-12.20210508.el9.src.rpm"},{"@id":"pkg:rpm/redhat/ncurses-libs@6.2-12.20210508.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=ncurses-6.2-12.20210508.el9.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:37:16.865686Z","vulnerability":{"name":"CVE-2023-50495"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:36.41601Z","products":[{"@id":"pkg:rpm/redhat/libgcc@11.5.0-11.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=gcc-11.5.0-11.el9.src.rpm"},{"@id":"pkg:rpm/redhat/libgcc@11.5.0-11.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=gcc-11.5.0-11.el9.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:37:16.865872Z","vulnerability":{"name":"CVE-2022-27943"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:36.416028Z","products":[{"@id":"pkg:rpm/redhat/pcre2@10.40-6.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=pcre2-10.40-6.el9.src.rpm"},{"@id":"pkg:rpm/redhat/pcre2-syntax@10.40-6.el9?arch=noarch\u0026distro=rhel-9.7\u0026upstream=pcre2-10.40-6.el9.src.rpm"},{"@id":"pkg:rpm/redhat/pcre2@10.40-6.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=pcre2-10.40-6.el9.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:37:16.865913Z","vulnerability":{"name":"CVE-2022-41409"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:36.416031Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.866039Z","vulnerability":{"name":"CVE-2026-27143"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:36.416035Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.866267Z","vulnerability":{"name":"CVE-2026-32281"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:36.416042Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.866369Z","vulnerability":{"name":"CVE-2026-32283"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:32:36.416046Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.866563Z","vulnerability":{"name":"CVE-2026-27140"}},{"action_statement":"This vulnerability was fixed in: 1.25.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:23:45.052976Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.865295Z","vulnerability":{"name":"CVE-2026-25679"}},{"action_statement":"This vulnerability was fixed in: 1.25.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:23:45.053017Z","products":[{"@id":"pkg:golang/google.golang.org/grpc@v1.69.4"}],"status":"affected","timestamp":"2026-05-14T10:37:16.866002Z","vulnerability":{"name":"CVE-2026-33186"}},{"action_statement":"This vulnerability was fixed in: 1.25.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:23:45.053151Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.867275Z","vulnerability":{"name":"CVE-2026-27142"}},{"action_statement":"This vulnerability was fixed in: 1.24.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:16:38.945535Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:37:16.86534Z","vulnerability":{"name":"CVE-2025-15281"}},{"action_statement":"This vulnerability was fixed in: 1.24.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:16:38.945569Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel/sdk@v1.33.0"}],"status":"affected","timestamp":"2026-05-14T10:37:16.866858Z","vulnerability":{"name":"CVE-2026-24051"}},{"action_statement":"This vulnerability was fixed in: 1.24.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:16:38.945565Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"affected","timestamp":"2026-05-14T10:37:16.866799Z","vulnerability":{"name":"CVE-2026-0915"}},{"action_statement":"This vulnerability was fixed in: 1.23.1","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:06:21.063088Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.866151Z","vulnerability":{"name":"CVE-2025-68121"}},{"action_statement":"This vulnerability was fixed in: 1.23.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:59:57.119432Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.865393Z","vulnerability":{"name":"CVE-2025-61726"}},{"action_statement":"This vulnerability was fixed in: 1.23.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:59:57.119466Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.866516Z","vulnerability":{"name":"CVE-2025-68119"}},{"action_statement":"This vulnerability was fixed in: 1.23.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:59:57.119471Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.866605Z","vulnerability":{"name":"CVE-2025-61728"}},{"action_statement":"This vulnerability was fixed in: 1.23.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:59:57.119477Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.867214Z","vulnerability":{"name":"CVE-2025-61731"}},{"action_statement":"This vulnerability was fixed in: 1.21.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T10:46:15.419162Z","products":[{"@id":"pkg:golang/stdlib@1.25.3"}],"status":"affected","timestamp":"2026-05-14T10:37:16.866471Z","vulnerability":{"name":"CVE-2025-61729"}}],"timestamp":"2026-03-12T17:45:42.38985189Z","tooling":"","version":18}