{"@context":"https://openvex.dev/ns/v0.2.0","@id":"pkg:docker/operator@1.23.0","author":"security@datadoghq.com","author_role":"Vulnerability Management","last_updated":"2026-05-14T11:46:28.250068516Z","statements":[{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.944771Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.944771Z","products":[{"@id":"pkg:rpm/redhat/coreutils-single@8.32-39.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=coreutils-8.32-39.el9.src.rpm"},{"@id":"pkg:rpm/redhat/coreutils-single@8.32-39.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=coreutils-8.32-39.el9.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.944771Z","vulnerability":{"name":"CVE-2025-5278"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.94482Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.94482Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.94482Z","vulnerability":{"name":"CVE-2026-39820"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.944895Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.944895Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.944894Z","vulnerability":{"name":"CVE-2026-4437"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.945015Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.945015Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.945015Z","vulnerability":{"name":"CVE-2026-4046"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.94613Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.94613Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.946129Z","vulnerability":{"name":"CVE-2026-5435"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.946424Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.946424Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.946424Z","vulnerability":{"name":"CVE-2026-5450"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.946992Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.946992Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.946992Z","vulnerability":{"name":"CVE-2026-5928"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.94729Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.947289Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.947289Z","vulnerability":{"name":"CVE-2026-42499"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.947444Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.947444Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.947443Z","vulnerability":{"name":"CVE-2026-33814"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.947595Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.947595Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.947595Z","vulnerability":{"name":"CVE-2026-39836"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.947718Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.947718Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.947718Z","vulnerability":{"name":"CVE-2026-4438"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.947971Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.947971Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.947971Z","vulnerability":{"name":"CVE-2026-33811"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.948157Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.948156Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.948156Z","vulnerability":{"name":"CVE-2026-39826"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.948217Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.948217Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.948217Z","vulnerability":{"name":"CVE-2026-39817"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.94832Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.94832Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.94832Z","vulnerability":{"name":"CVE-2026-42501"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.948604Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.948604Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.948603Z","vulnerability":{"name":"CVE-2026-39825"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.949097Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.949097Z","products":[{"@id":"pkg:golang/helm.sh/helm/v3@v3.18.5"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.949097Z","vulnerability":{"name":"CVE-2026-35206"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:04.144482Z","products":[{"@id":"pkg:rpm/redhat/ncurses-base@6.2-12.20210508.el9?arch=noarch\u0026distro=rhel-9.7\u0026upstream=ncurses-6.2-12.20210508.el9.src.rpm"},{"@id":"pkg:rpm/redhat/ncurses-libs@6.2-12.20210508.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=ncurses-6.2-12.20210508.el9.src.rpm"},{"@id":"pkg:rpm/redhat/ncurses-libs@6.2-12.20210508.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=ncurses-6.2-12.20210508.el9.src.rpm"}],"status":"affected","timestamp":"2026-05-14T11:08:51.946709Z","vulnerability":{"name":"CVE-2023-50495"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.949308Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.949308Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.949308Z","vulnerability":{"name":"CVE-2026-39823"}},{"action_statement":"","action_statement_timestamp":"2026-05-14T11:08:51.952189Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:51.952189Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"under_investigation","timestamp":"2026-05-14T11:08:51.952188Z","vulnerability":{"name":"CVE-2026-39819"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:52.029456Z","products":[{"@id":"pkg:golang/stdlib@1.25.5"}],"status":"fixed","timestamp":"2026-05-14T11:08:52.029456Z","vulnerability":{"name":"CVE-2025-61726"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:52.029511Z","products":[{"@id":"pkg:golang/stdlib@1.25.5"}],"status":"fixed","timestamp":"2026-05-14T11:08:52.029511Z","vulnerability":{"name":"CVE-2025-68119"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:52.029519Z","products":[{"@id":"pkg:golang/stdlib@1.25.5"}],"status":"fixed","timestamp":"2026-05-14T11:08:52.029519Z","vulnerability":{"name":"CVE-2025-61728"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:52.029529Z","products":[{"@id":"pkg:golang/stdlib@1.25.5"}],"status":"fixed","timestamp":"2026-05-14T11:08:52.029529Z","vulnerability":{"name":"CVE-2025-61731"}},{"action_statement":"","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:08:52.029536Z","products":[{"@id":"pkg:golang/stdlib@1.25.5"}],"status":"fixed","timestamp":"2026-05-14T11:08:52.029536Z","vulnerability":{"name":"CVE-2025-61730"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:04.144487Z","products":[{"@id":"pkg:rpm/redhat/libgcc@11.5.0-11.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=gcc-11.5.0-11.el9.src.rpm"},{"@id":"pkg:rpm/redhat/libgcc@11.5.0-11.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=gcc-11.5.0-11.el9.src.rpm"}],"status":"affected","timestamp":"2026-05-14T11:08:51.947355Z","vulnerability":{"name":"CVE-2022-27943"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:04.144492Z","products":[{"@id":"pkg:rpm/redhat/pcre2@10.40-6.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=pcre2-10.40-6.el9.src.rpm"},{"@id":"pkg:rpm/redhat/pcre2-syntax@10.40-6.el9?arch=noarch\u0026distro=rhel-9.7\u0026upstream=pcre2-10.40-6.el9.src.rpm"},{"@id":"pkg:rpm/redhat/pcre2@10.40-6.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=pcre2-10.40-6.el9.src.rpm"}],"status":"affected","timestamp":"2026-05-14T11:08:51.947394Z","vulnerability":{"name":"CVE-2022-41409"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:04.144495Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.94754Z","vulnerability":{"name":"CVE-2026-27143"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:04.144498Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.947779Z","vulnerability":{"name":"CVE-2026-32281"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:04.144504Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.947863Z","vulnerability":{"name":"CVE-2026-32280"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:04.144511Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.94792Z","vulnerability":{"name":"CVE-2026-32283"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:04.144514Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.948023Z","vulnerability":{"name":"CVE-2026-27140"}},{"action_statement":"This vulnerability was fixed in: 1.24.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:23:21.344935Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel/sdk@v1.33.0"}],"status":"affected","timestamp":"2026-05-14T11:08:51.948129Z","vulnerability":{"name":"CVE-2026-24051"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"This vulnerability is not exploitable in our environment, as the affected function is not used by the application. The binary does not link against or invoke the vulnerable component (cap_set_file function).","justification":"vulnerable_code_not_present","last_updated":"2026-05-14T11:35:04.144522Z","products":[{"@id":"pkg:rpm/redhat/libcap@2.48-10.el9?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=libcap-2.48-10.el9.src.rpm"},{"@id":"pkg:rpm/redhat/libcap@2.48-10.el9?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=libcap-2.48-10.el9.src.rpm"}],"status":"affected","timestamp":"2026-05-14T11:08:51.950253Z","vulnerability":{"name":"CVE-2026-4878"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"The vulnerability exploits the BSD-specific kenv command in the OpenTelemetry Go SDK resource detection. This code is gated by Go OS build constraints and is only compiled on BSD/Solaris targets. The operator binary is built with GOOS=linux, so the vulnerable code is excluded from the compiled binary and is not present in the image.","justification":"vulnerable_code_not_present","last_updated":"2026-05-14T11:35:04.144528Z","products":[{"@id":"pkg:golang/go.opentelemetry.io/otel/sdk@v1.33.0"}],"status":"affected","timestamp":"2026-05-14T11:08:51.950453Z","vulnerability":{"name":"CVE-2026-39883"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:04.144531Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.95093Z","vulnerability":{"name":"CVE-2026-32289"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:04.144534Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.951219Z","vulnerability":{"name":"CVE-2026-32282"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:04.144537Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.951618Z","vulnerability":{"name":"CVE-2026-27144"}},{"action_statement":"This vulnerability was fixed in: 1.26.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:35:04.14454Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.952288Z","vulnerability":{"name":"CVE-2026-32288"}},{"action_statement":"This vulnerability was fixed in: 1.25.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:52.541434Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.945082Z","vulnerability":{"name":"CVE-2026-25679"}},{"action_statement":"This vulnerability was fixed in: 1.25.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:52.541465Z","products":[{"@id":"pkg:golang/google.golang.org/grpc@v1.69.4"}],"status":"affected","timestamp":"2026-05-14T11:08:51.947509Z","vulnerability":{"name":"CVE-2026-33186"}},{"action_statement":"This vulnerability was fixed in: 1.25.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:52.541475Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.949867Z","vulnerability":{"name":"CVE-2026-27142"}},{"action_statement":"This vulnerability was fixed in: 1.25.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:29:52.541482Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.952345Z","vulnerability":{"name":"CVE-2026-27139"}},{"action_statement":"This vulnerability was fixed in: 1.24.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:23:21.344897Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"affected","timestamp":"2026-05-14T11:08:51.945171Z","vulnerability":{"name":"CVE-2025-15281"}},{"action_statement":"This vulnerability was fixed in: 1.24.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:23:21.344931Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"affected","timestamp":"2026-05-14T11:08:51.948075Z","vulnerability":{"name":"CVE-2026-0915"}},{"action_statement":"This vulnerability was fixed in: 1.24.0","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:23:21.344941Z","products":[{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=aarch64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-common@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"},{"@id":"pkg:rpm/redhat/glibc-minimal-langpack@2.34-231.el9_7.2?arch=x86_64\u0026distro=rhel-9.7\u0026upstream=glibc-2.34-231.el9_7.2.src.rpm"}],"status":"affected","timestamp":"2026-05-14T11:08:51.951152Z","vulnerability":{"name":"CVE-2026-0861"}},{"action_statement":"This vulnerability was fixed in: 1.23.1","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:14.6821Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.947645Z","vulnerability":{"name":"CVE-2025-68121"}},{"action_statement":"This vulnerability was fixed in: 1.23.1","action_statement_timestamp":"0001-01-01T00:00:00Z","impact_statement":"","justification":"","last_updated":"2026-05-14T11:17:14.682136Z","products":[{"@id":"pkg:golang/stdlib@1.25.6"}],"status":"affected","timestamp":"2026-05-14T11:08:51.951061Z","vulnerability":{"name":"CVE-2025-61732"}}],"timestamp":"2026-03-12T17:45:41.19464461Z","tooling":"","version":18}