{
  "_class" : "io.jenkins.plugins.analysis.core.restapi.ReportApi",
  "issues" : [
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-bc0adcb9",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-2673: OsPackageVulnerability\u000a\u000aopenssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group\u000a\u000aFor additional help see: **Vulnerability CVE-2026-2673**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-2673](https://avd.aquasec.com/nvd/cve-2026-2673)|\u000a\u000aIssue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\u000apreferred key exchange group when its key exchange group configuration includes\u000athe default by using the 'DEFAULT' keyword.\u000a\u000aImpact summary: A less preferred key exchange may be used even when a more\u000apreferred group is supported by both client and server, if the group\u000awas not included among the client's initial predicated keyshares.\u000aThis will sometimes be the case with the new hybrid post-quantum groups,\u000aif the client chooses to defer their use until specifically requested by\u000athe server.\u000a\u000aIf an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to\u000ainterpolate the built-in default group list into its own configuration, perhaps\u000aadding or removing specific elements, then an implementation defect causes the\u000a'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups\u000awere treated as a single sufficiently secure 'tuple', with the server not\u000asending a Hello Retry Request (HRR) even when a group in a more preferred tuple\u000awas mutually supported.\u000a\u000aAs a result, the client and server might fail to negotiate a mutually supported\u000apost-quantum key agreement group, such as 'X25519MLKEM768', if the client's\u000aconfiguration results in only 'classical' groups (such as 'X25519' being the\u000aonly ones in the client's initial keyshare prediction).\u000a\u000aOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\u000a1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'\u000alist of groups, and treated all the supported groups as sufficiently secure.\u000aIf any of the keyshares predicted by the client were supported by the server\u000athe most preferred among these was selected, even if other groups supported by\u000athe client, but not included in the list of predicted keyshares would have been\u000amore preferred, if included.\u000a\u000aThe new syntax partitions the groups into distinct 'tuples' of roughly\u000aequivalent security.  Within each tuple the most preferred group included among\u000athe client's predicted keyshares is chosen, but if the client supports a group\u000afrom a more preferred tuple, but did not predict any corresponding keyshares,\u000athe server will ask the client to retry the ClientHello (by issuing a Hello\u000aRetry Request or HRR) with the most preferred mutually supported group.\u000a\u000aThe above works as expected when the server's configuration uses the built-in\u000adefault group list, or explicitly defines its own list by directly defining the\u000avarious desired groups and group 'tuples'.\u000a\u000aNo OpenSSL FIPS modules are affected by this issue, the code in question lies\u000aoutside the FIPS boundary.\u000a\u000aOpenSSL 3.6 and 3.5 are vulnerable to this issue.\u000a\u000aOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\u000aOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\u000a\u000aOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-2673\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-2673](https://avd.aquasec.com/nvd/cve-2026-2673)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2026-2673: : CVE-2026-2673: OsPackageVulnerability\u000a\u000aopenssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group\u000a\u000aFor additional help see: **Vulnerability CVE-2026-2673**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-2673](https://avd.aquasec.com/nvd/cve-2026-2673)|\u000a\u000aIssue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\u000apreferred key exchange group when its key exchange group configuration includes\u000athe default by using the 'DEFAULT' keyword.\u000a\u000aImpact summary: A less preferred key exchange may be used even when a more\u000apreferred group is supported by both client and server, if the group\u000awas not included among the client's initial predicated keyshares.\u000aThis will sometimes be the case with the new hybrid post-quantum groups,\u000aif the client chooses to defer their use until specifically requested by\u000athe server.\u000a\u000aIf an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to\u000ainterpolate the built-in default group list into its own configuration, perhaps\u000aadding or removing specific elements, then an implementation defect causes the\u000a'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups\u000awere treated as a single sufficiently secure 'tuple', with the server not\u000asending a Hello Retry Request (HRR) even when a group in a more preferred tuple\u000awas mutually supported.\u000a\u000aAs a result, the client and server might fail to negotiate a mutually supported\u000apost-quantum key agreement group, such as 'X25519MLKEM768', if the client's\u000aconfiguration results in only 'classical' groups (such as 'X25519' being the\u000aonly ones in the client's initial keyshare prediction).\u000a\u000aOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\u000a1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'\u000alist of groups, and treated all the supported groups as sufficiently secure.\u000aIf any of the keyshares predicted by the client were supported by the server\u000athe most preferred among these was selected, even if other groups supported by\u000athe client, but not included in the list of predicted keyshares would have been\u000amore preferred, if included.\u000a\u000aThe new syntax partitions the groups into distinct 'tuples' of roughly\u000aequivalent security.  Within each tuple the most preferred group included among\u000athe client's predicted keyshares is chosen, but if the client supports a group\u000afrom a more preferred tuple, but did not predict any corresponding keyshares,\u000athe server will ask the client to retry the ClientHello (by issuing a Hello\u000aRetry Request or HRR) with the most preferred mutually supported group.\u000a\u000aThe above works as expected when the server's configuration uses the built-in\u000adefault group list, or explicitly defines its own list by directly defining the\u000avarious desired groups and group 'tuples'.\u000a\u000aNo OpenSSL FIPS modules are affected by this issue, the code in question lies\u000aoutside the FIPS boundary.\u000a\u000aOpenSSL 3.6 and 3.5 are vulnerable to this issue.\u000a\u000aOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\u000aOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\u000a\u000aOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-2673\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-2673](https://avd.aquasec.com/nvd/cve-2026-2673)",
      "type" : "CVE-2026-2673"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-bc0adcb9",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-2673: OsPackageVulnerability\u000a\u000aopenssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group\u000a\u000aFor additional help see: **Vulnerability CVE-2026-2673**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-2673](https://avd.aquasec.com/nvd/cve-2026-2673)|\u000a\u000aIssue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\u000apreferred key exchange group when its key exchange group configuration includes\u000athe default by using the 'DEFAULT' keyword.\u000a\u000aImpact summary: A less preferred key exchange may be used even when a more\u000apreferred group is supported by both client and server, if the group\u000awas not included among the client's initial predicated keyshares.\u000aThis will sometimes be the case with the new hybrid post-quantum groups,\u000aif the client chooses to defer their use until specifically requested by\u000athe server.\u000a\u000aIf an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to\u000ainterpolate the built-in default group list into its own configuration, perhaps\u000aadding or removing specific elements, then an implementation defect causes the\u000a'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups\u000awere treated as a single sufficiently secure 'tuple', with the server not\u000asending a Hello Retry Request (HRR) even when a group in a more preferred tuple\u000awas mutually supported.\u000a\u000aAs a result, the client and server might fail to negotiate a mutually supported\u000apost-quantum key agreement group, such as 'X25519MLKEM768', if the client's\u000aconfiguration results in only 'classical' groups (such as 'X25519' being the\u000aonly ones in the client's initial keyshare prediction).\u000a\u000aOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\u000a1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'\u000alist of groups, and treated all the supported groups as sufficiently secure.\u000aIf any of the keyshares predicted by the client were supported by the server\u000athe most preferred among these was selected, even if other groups supported by\u000athe client, but not included in the list of predicted keyshares would have been\u000amore preferred, if included.\u000a\u000aThe new syntax partitions the groups into distinct 'tuples' of roughly\u000aequivalent security.  Within each tuple the most preferred group included among\u000athe client's predicted keyshares is chosen, but if the client supports a group\u000afrom a more preferred tuple, but did not predict any corresponding keyshares,\u000athe server will ask the client to retry the ClientHello (by issuing a Hello\u000aRetry Request or HRR) with the most preferred mutually supported group.\u000a\u000aThe above works as expected when the server's configuration uses the built-in\u000adefault group list, or explicitly defines its own list by directly defining the\u000avarious desired groups and group 'tuples'.\u000a\u000aNo OpenSSL FIPS modules are affected by this issue, the code in question lies\u000aoutside the FIPS boundary.\u000a\u000aOpenSSL 3.6 and 3.5 are vulnerable to this issue.\u000a\u000aOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\u000aOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\u000a\u000aOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-2673\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-2673](https://avd.aquasec.com/nvd/cve-2026-2673)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2026-2673: : CVE-2026-2673: OsPackageVulnerability\u000a\u000aopenssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group\u000a\u000aFor additional help see: **Vulnerability CVE-2026-2673**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-2673](https://avd.aquasec.com/nvd/cve-2026-2673)|\u000a\u000aIssue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\u000apreferred key exchange group when its key exchange group configuration includes\u000athe default by using the 'DEFAULT' keyword.\u000a\u000aImpact summary: A less preferred key exchange may be used even when a more\u000apreferred group is supported by both client and server, if the group\u000awas not included among the client's initial predicated keyshares.\u000aThis will sometimes be the case with the new hybrid post-quantum groups,\u000aif the client chooses to defer their use until specifically requested by\u000athe server.\u000a\u000aIf an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to\u000ainterpolate the built-in default group list into its own configuration, perhaps\u000aadding or removing specific elements, then an implementation defect causes the\u000a'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups\u000awere treated as a single sufficiently secure 'tuple', with the server not\u000asending a Hello Retry Request (HRR) even when a group in a more preferred tuple\u000awas mutually supported.\u000a\u000aAs a result, the client and server might fail to negotiate a mutually supported\u000apost-quantum key agreement group, such as 'X25519MLKEM768', if the client's\u000aconfiguration results in only 'classical' groups (such as 'X25519' being the\u000aonly ones in the client's initial keyshare prediction).\u000a\u000aOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\u000a1.3 key agreement group on TLS servers.  The old syntax had a single 'flat'\u000alist of groups, and treated all the supported groups as sufficiently secure.\u000aIf any of the keyshares predicted by the client were supported by the server\u000athe most preferred among these was selected, even if other groups supported by\u000athe client, but not included in the list of predicted keyshares would have been\u000amore preferred, if included.\u000a\u000aThe new syntax partitions the groups into distinct 'tuples' of roughly\u000aequivalent security.  Within each tuple the most preferred group included among\u000athe client's predicted keyshares is chosen, but if the client supports a group\u000afrom a more preferred tuple, but did not predict any corresponding keyshares,\u000athe server will ask the client to retry the ClientHello (by issuing a Hello\u000aRetry Request or HRR) with the most preferred mutually supported group.\u000a\u000aThe above works as expected when the server's configuration uses the built-in\u000adefault group list, or explicitly defines its own list by directly defining the\u000avarious desired groups and group 'tuples'.\u000a\u000aNo OpenSSL FIPS modules are affected by this issue, the code in question lies\u000aoutside the FIPS boundary.\u000a\u000aOpenSSL 3.6 and 3.5 are vulnerable to this issue.\u000a\u000aOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\u000aOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\u000a\u000aOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-2673\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-2673](https://avd.aquasec.com/nvd/cve-2026-2673)",
      "type" : "CVE-2026-2673"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-d29a4e25",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-28387: OsPackageVulnerability\u000a\u000aIssue summary: An uncommon configuration of clients performing DANE TL ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28387**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-28387](https://avd.aquasec.com/nvd/cve-2026-28387)|\u000a\u000aIssue summary: An uncommon configuration of clients performing DANE TLSA-based\u000aserver authentication, when paired with uncommon server DANE TLSA records, may\u000aresult in a use-after-free and/or double-free on the client side.\u000a\u000aImpact summary: A use after free can have a range of potential consequences\u000asuch as the corruption of valid data, crashes or execution of arbitrary code.\u000a\u000aHowever, the issue only affects clients that make use of TLSA records with both\u000athe PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate\u000ausage.\u000a\u000aBy far the most common deployment of DANE is in SMTP MTAs for which RFC7672\u000arecommends that clients treat as 'unusable' any TLSA records that have the PKIX\u000acertificate usages.  These SMTP (or other similar) clients are not vulnerable\u000ato this issue.  Conversely, any clients that support only the PKIX usages, and\u000aignore the DANE-TA(2) usage are also not vulnerable.\u000a\u000aThe client would also need to be communicating with a server that publishes a\u000aTLSA RRset with both types of TLSA records.\u000a\u000aNo FIPS modules are affected by this issue, the problem code is outside the\u000aFIPS module boundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28387\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28387](https://avd.aquasec.com/nvd/cve-2026-28387)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2026-28387: : CVE-2026-28387: OsPackageVulnerability\u000a\u000aIssue summary: An uncommon configuration of clients performing DANE TL ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28387**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-28387](https://avd.aquasec.com/nvd/cve-2026-28387)|\u000a\u000aIssue summary: An uncommon configuration of clients performing DANE TLSA-based\u000aserver authentication, when paired with uncommon server DANE TLSA records, may\u000aresult in a use-after-free and/or double-free on the client side.\u000a\u000aImpact summary: A use after free can have a range of potential consequences\u000asuch as the corruption of valid data, crashes or execution of arbitrary code.\u000a\u000aHowever, the issue only affects clients that make use of TLSA records with both\u000athe PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate\u000ausage.\u000a\u000aBy far the most common deployment of DANE is in SMTP MTAs for which RFC7672\u000arecommends that clients treat as 'unusable' any TLSA records that have the PKIX\u000acertificate usages.  These SMTP (or other similar) clients are not vulnerable\u000ato this issue.  Conversely, any clients that support only the PKIX usages, and\u000aignore the DANE-TA(2) usage are also not vulnerable.\u000a\u000aThe client would also need to be communicating with a server that publishes a\u000aTLSA RRset with both types of TLSA records.\u000a\u000aNo FIPS modules are affected by this issue, the problem code is outside the\u000aFIPS module boundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28387\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28387](https://avd.aquasec.com/nvd/cve-2026-28387)",
      "type" : "CVE-2026-28387"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-d29a4e25",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-28387: OsPackageVulnerability\u000a\u000aIssue summary: An uncommon configuration of clients performing DANE TL ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28387**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-28387](https://avd.aquasec.com/nvd/cve-2026-28387)|\u000a\u000aIssue summary: An uncommon configuration of clients performing DANE TLSA-based\u000aserver authentication, when paired with uncommon server DANE TLSA records, may\u000aresult in a use-after-free and/or double-free on the client side.\u000a\u000aImpact summary: A use after free can have a range of potential consequences\u000asuch as the corruption of valid data, crashes or execution of arbitrary code.\u000a\u000aHowever, the issue only affects clients that make use of TLSA records with both\u000athe PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate\u000ausage.\u000a\u000aBy far the most common deployment of DANE is in SMTP MTAs for which RFC7672\u000arecommends that clients treat as 'unusable' any TLSA records that have the PKIX\u000acertificate usages.  These SMTP (or other similar) clients are not vulnerable\u000ato this issue.  Conversely, any clients that support only the PKIX usages, and\u000aignore the DANE-TA(2) usage are also not vulnerable.\u000a\u000aThe client would also need to be communicating with a server that publishes a\u000aTLSA RRset with both types of TLSA records.\u000a\u000aNo FIPS modules are affected by this issue, the problem code is outside the\u000aFIPS module boundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28387\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28387](https://avd.aquasec.com/nvd/cve-2026-28387)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2026-28387: : CVE-2026-28387: OsPackageVulnerability\u000a\u000aIssue summary: An uncommon configuration of clients performing DANE TL ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28387**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-28387](https://avd.aquasec.com/nvd/cve-2026-28387)|\u000a\u000aIssue summary: An uncommon configuration of clients performing DANE TLSA-based\u000aserver authentication, when paired with uncommon server DANE TLSA records, may\u000aresult in a use-after-free and/or double-free on the client side.\u000a\u000aImpact summary: A use after free can have a range of potential consequences\u000asuch as the corruption of valid data, crashes or execution of arbitrary code.\u000a\u000aHowever, the issue only affects clients that make use of TLSA records with both\u000athe PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate\u000ausage.\u000a\u000aBy far the most common deployment of DANE is in SMTP MTAs for which RFC7672\u000arecommends that clients treat as 'unusable' any TLSA records that have the PKIX\u000acertificate usages.  These SMTP (or other similar) clients are not vulnerable\u000ato this issue.  Conversely, any clients that support only the PKIX usages, and\u000aignore the DANE-TA(2) usage are also not vulnerable.\u000a\u000aThe client would also need to be communicating with a server that publishes a\u000aTLSA RRset with both types of TLSA records.\u000a\u000aNo FIPS modules are affected by this issue, the problem code is outside the\u000aFIPS module boundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28387\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28387](https://avd.aquasec.com/nvd/cve-2026-28387)",
      "type" : "CVE-2026-28387"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-d2b6e716",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-28388: OsPackageVulnerability\u000a\u000aIssue summary: When a delta CRL that contains a Delta CRL Indicator ex ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28388**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-28388](https://avd.aquasec.com/nvd/cve-2026-28388)|\u000a\u000aIssue summary: When a delta CRL that contains a Delta CRL Indicator extension\u000ais processed a NULL pointer dereference might happen if the required CRL\u000aNumber extension is missing.\u000a\u000aImpact summary: A NULL pointer dereference can trigger a crash which\u000aleads to a Denial of Service for an application.\u000a\u000aWhen CRL processing and delta CRL processing is enabled during X.509\u000acertificate verification, the delta CRL processing does not check\u000awhether the CRL Number extension is NULL before dereferencing it.\u000aWhen a malformed delta CRL file is being processed, this parameter\u000acan be NULL, causing a NULL pointer dereference.\u000a\u000aExploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in\u000athe verification context, the certificate being verified to contain a\u000afreshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and\u000aan attacker to provide a malformed CRL to an application that processes it.\u000a\u000aThe vulnerability is limited to Denial of Service and cannot be escalated to\u000aachieve code execution or memory disclosure. For that reason the issue was\u000aassessed as Low severity according to our Security Policy.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\u000aas the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28388\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28388](https://avd.aquasec.com/nvd/cve-2026-28388)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2026-28388: : CVE-2026-28388: OsPackageVulnerability\u000a\u000aIssue summary: When a delta CRL that contains a Delta CRL Indicator ex ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28388**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-28388](https://avd.aquasec.com/nvd/cve-2026-28388)|\u000a\u000aIssue summary: When a delta CRL that contains a Delta CRL Indicator extension\u000ais processed a NULL pointer dereference might happen if the required CRL\u000aNumber extension is missing.\u000a\u000aImpact summary: A NULL pointer dereference can trigger a crash which\u000aleads to a Denial of Service for an application.\u000a\u000aWhen CRL processing and delta CRL processing is enabled during X.509\u000acertificate verification, the delta CRL processing does not check\u000awhether the CRL Number extension is NULL before dereferencing it.\u000aWhen a malformed delta CRL file is being processed, this parameter\u000acan be NULL, causing a NULL pointer dereference.\u000a\u000aExploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in\u000athe verification context, the certificate being verified to contain a\u000afreshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and\u000aan attacker to provide a malformed CRL to an application that processes it.\u000a\u000aThe vulnerability is limited to Denial of Service and cannot be escalated to\u000aachieve code execution or memory disclosure. For that reason the issue was\u000aassessed as Low severity according to our Security Policy.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\u000aas the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28388\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28388](https://avd.aquasec.com/nvd/cve-2026-28388)",
      "type" : "CVE-2026-28388"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-d2b6e716",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-28388: OsPackageVulnerability\u000a\u000aIssue summary: When a delta CRL that contains a Delta CRL Indicator ex ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28388**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-28388](https://avd.aquasec.com/nvd/cve-2026-28388)|\u000a\u000aIssue summary: When a delta CRL that contains a Delta CRL Indicator extension\u000ais processed a NULL pointer dereference might happen if the required CRL\u000aNumber extension is missing.\u000a\u000aImpact summary: A NULL pointer dereference can trigger a crash which\u000aleads to a Denial of Service for an application.\u000a\u000aWhen CRL processing and delta CRL processing is enabled during X.509\u000acertificate verification, the delta CRL processing does not check\u000awhether the CRL Number extension is NULL before dereferencing it.\u000aWhen a malformed delta CRL file is being processed, this parameter\u000acan be NULL, causing a NULL pointer dereference.\u000a\u000aExploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in\u000athe verification context, the certificate being verified to contain a\u000afreshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and\u000aan attacker to provide a malformed CRL to an application that processes it.\u000a\u000aThe vulnerability is limited to Denial of Service and cannot be escalated to\u000aachieve code execution or memory disclosure. For that reason the issue was\u000aassessed as Low severity according to our Security Policy.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\u000aas the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28388\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28388](https://avd.aquasec.com/nvd/cve-2026-28388)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2026-28388: : CVE-2026-28388: OsPackageVulnerability\u000a\u000aIssue summary: When a delta CRL that contains a Delta CRL Indicator ex ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28388**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-28388](https://avd.aquasec.com/nvd/cve-2026-28388)|\u000a\u000aIssue summary: When a delta CRL that contains a Delta CRL Indicator extension\u000ais processed a NULL pointer dereference might happen if the required CRL\u000aNumber extension is missing.\u000a\u000aImpact summary: A NULL pointer dereference can trigger a crash which\u000aleads to a Denial of Service for an application.\u000a\u000aWhen CRL processing and delta CRL processing is enabled during X.509\u000acertificate verification, the delta CRL processing does not check\u000awhether the CRL Number extension is NULL before dereferencing it.\u000aWhen a malformed delta CRL file is being processed, this parameter\u000acan be NULL, causing a NULL pointer dereference.\u000a\u000aExploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in\u000athe verification context, the certificate being verified to contain a\u000afreshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and\u000aan attacker to provide a malformed CRL to an application that processes it.\u000a\u000aThe vulnerability is limited to Denial of Service and cannot be escalated to\u000aachieve code execution or memory disclosure. For that reason the issue was\u000aassessed as Low severity according to our Security Policy.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\u000aas the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28388\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28388](https://avd.aquasec.com/nvd/cve-2026-28388)",
      "type" : "CVE-2026-28388"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-d2d38007",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-28389: OsPackageVulnerability\u000a\u000aIssue summary: During processing of a crafted CMS EnvelopedData messag ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28389**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-28389](https://avd.aquasec.com/nvd/cve-2026-28389)|\u000a\u000aIssue summary: During processing of a crafted CMS EnvelopedData message\u000awith KeyAgreeRecipientInfo a NULL pointer dereference can happen.\u000a\u000aImpact summary: Applications that process attacker-controlled CMS data may\u000acrash before authentication or cryptographic operations occur resulting in\u000aDenial of Service.\u000a\u000aWhen a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is\u000aprocessed, the optional parameters field of KeyEncryptionAlgorithmIdentifier\u000ais examined without checking for its presence. This results in a NULL\u000apointer dereference if the field is missing.\u000a\u000aApplications and services that call CMS_decrypt() on untrusted input\u000a(e.g., S/MIME processing or CMS-based protocols) are vulnerable.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\u000aissue, as the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28389\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28389](https://avd.aquasec.com/nvd/cve-2026-28389)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2026-28389: : CVE-2026-28389: OsPackageVulnerability\u000a\u000aIssue summary: During processing of a crafted CMS EnvelopedData messag ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28389**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-28389](https://avd.aquasec.com/nvd/cve-2026-28389)|\u000a\u000aIssue summary: During processing of a crafted CMS EnvelopedData message\u000awith KeyAgreeRecipientInfo a NULL pointer dereference can happen.\u000a\u000aImpact summary: Applications that process attacker-controlled CMS data may\u000acrash before authentication or cryptographic operations occur resulting in\u000aDenial of Service.\u000a\u000aWhen a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is\u000aprocessed, the optional parameters field of KeyEncryptionAlgorithmIdentifier\u000ais examined without checking for its presence. This results in a NULL\u000apointer dereference if the field is missing.\u000a\u000aApplications and services that call CMS_decrypt() on untrusted input\u000a(e.g., S/MIME processing or CMS-based protocols) are vulnerable.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\u000aissue, as the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28389\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28389](https://avd.aquasec.com/nvd/cve-2026-28389)",
      "type" : "CVE-2026-28389"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-d2d38007",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-28389: OsPackageVulnerability\u000a\u000aIssue summary: During processing of a crafted CMS EnvelopedData messag ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28389**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-28389](https://avd.aquasec.com/nvd/cve-2026-28389)|\u000a\u000aIssue summary: During processing of a crafted CMS EnvelopedData message\u000awith KeyAgreeRecipientInfo a NULL pointer dereference can happen.\u000a\u000aImpact summary: Applications that process attacker-controlled CMS data may\u000acrash before authentication or cryptographic operations occur resulting in\u000aDenial of Service.\u000a\u000aWhen a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is\u000aprocessed, the optional parameters field of KeyEncryptionAlgorithmIdentifier\u000ais examined without checking for its presence. This results in a NULL\u000apointer dereference if the field is missing.\u000a\u000aApplications and services that call CMS_decrypt() on untrusted input\u000a(e.g., S/MIME processing or CMS-based protocols) are vulnerable.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\u000aissue, as the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28389\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28389](https://avd.aquasec.com/nvd/cve-2026-28389)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2026-28389: : CVE-2026-28389: OsPackageVulnerability\u000a\u000aIssue summary: During processing of a crafted CMS EnvelopedData messag ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28389**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-28389](https://avd.aquasec.com/nvd/cve-2026-28389)|\u000a\u000aIssue summary: During processing of a crafted CMS EnvelopedData message\u000awith KeyAgreeRecipientInfo a NULL pointer dereference can happen.\u000a\u000aImpact summary: Applications that process attacker-controlled CMS data may\u000acrash before authentication or cryptographic operations occur resulting in\u000aDenial of Service.\u000a\u000aWhen a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is\u000aprocessed, the optional parameters field of KeyEncryptionAlgorithmIdentifier\u000ais examined without checking for its presence. This results in a NULL\u000apointer dereference if the field is missing.\u000a\u000aApplications and services that call CMS_decrypt() on untrusted input\u000a(e.g., S/MIME processing or CMS-based protocols) are vulnerable.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\u000aissue, as the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28389\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28389](https://avd.aquasec.com/nvd/cve-2026-28389)",
      "type" : "CVE-2026-28389"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-840d6efb",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-28390: OsPackageVulnerability\u000a\u000aopenssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28390**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|libssl3|3.5.6-r0|[CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)|\u000a\u000aIssue summary: During processing of a crafted CMS EnvelopedData message\u000awith KeyTransportRecipientInfo a NULL pointer dereference can happen.\u000a\u000aImpact summary: Applications that process attacker-controlled CMS data may\u000acrash before authentication or cryptographic operations occur resulting in\u000aDenial of Service.\u000a\u000aWhen a CMS EnvelopedData message that uses KeyTransportRecipientInfo with\u000aRSA-OAEP encryption is processed, the optional parameters field of\u000aRSA-OAEP SourceFunc algorithm identifier is examined without checking\u000afor its presence. This results in a NULL pointer dereference if the field\u000ais missing.\u000a\u000aApplications and services that call CMS_decrypt() on untrusted input\u000a(e.g., S/MIME processing or CMS-based protocols) are vulnerable.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\u000aissue, as the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28390\u000aSeverity: HIGH\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "HIGH",
      "toString" : "govway(1,0): CVE-2026-28390: : CVE-2026-28390: OsPackageVulnerability\u000a\u000aopenssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28390**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|libssl3|3.5.6-r0|[CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)|\u000a\u000aIssue summary: During processing of a crafted CMS EnvelopedData message\u000awith KeyTransportRecipientInfo a NULL pointer dereference can happen.\u000a\u000aImpact summary: Applications that process attacker-controlled CMS data may\u000acrash before authentication or cryptographic operations occur resulting in\u000aDenial of Service.\u000a\u000aWhen a CMS EnvelopedData message that uses KeyTransportRecipientInfo with\u000aRSA-OAEP encryption is processed, the optional parameters field of\u000aRSA-OAEP SourceFunc algorithm identifier is examined without checking\u000afor its presence. This results in a NULL pointer dereference if the field\u000ais missing.\u000a\u000aApplications and services that call CMS_decrypt() on untrusted input\u000a(e.g., S/MIME processing or CMS-based protocols) are vulnerable.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\u000aissue, as the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28390\u000aSeverity: HIGH\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)",
      "type" : "CVE-2026-28390"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-840d6efb",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-28390: OsPackageVulnerability\u000a\u000aopenssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28390**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|libssl3|3.5.6-r0|[CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)|\u000a\u000aIssue summary: During processing of a crafted CMS EnvelopedData message\u000awith KeyTransportRecipientInfo a NULL pointer dereference can happen.\u000a\u000aImpact summary: Applications that process attacker-controlled CMS data may\u000acrash before authentication or cryptographic operations occur resulting in\u000aDenial of Service.\u000a\u000aWhen a CMS EnvelopedData message that uses KeyTransportRecipientInfo with\u000aRSA-OAEP encryption is processed, the optional parameters field of\u000aRSA-OAEP SourceFunc algorithm identifier is examined without checking\u000afor its presence. This results in a NULL pointer dereference if the field\u000ais missing.\u000a\u000aApplications and services that call CMS_decrypt() on untrusted input\u000a(e.g., S/MIME processing or CMS-based protocols) are vulnerable.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\u000aissue, as the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28390\u000aSeverity: HIGH\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "HIGH",
      "toString" : "govway(1,0): CVE-2026-28390: : CVE-2026-28390: OsPackageVulnerability\u000a\u000aopenssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing\u000a\u000aFor additional help see: **Vulnerability CVE-2026-28390**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|libssl3|3.5.6-r0|[CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)|\u000a\u000aIssue summary: During processing of a crafted CMS EnvelopedData message\u000awith KeyTransportRecipientInfo a NULL pointer dereference can happen.\u000a\u000aImpact summary: Applications that process attacker-controlled CMS data may\u000acrash before authentication or cryptographic operations occur resulting in\u000aDenial of Service.\u000a\u000aWhen a CMS EnvelopedData message that uses KeyTransportRecipientInfo with\u000aRSA-OAEP encryption is processed, the optional parameters field of\u000aRSA-OAEP SourceFunc algorithm identifier is examined without checking\u000afor its presence. This results in a NULL pointer dereference if the field\u000ais missing.\u000a\u000aApplications and services that call CMS_decrypt() on untrusted input\u000a(e.g., S/MIME processing or CMS-based protocols) are vulnerable.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\u000aissue, as the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-28390\u000aSeverity: HIGH\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)",
      "type" : "CVE-2026-28390"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-7e2b0533",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-31789: OsPackageVulnerability\u000a\u000aIssue summary: Converting an excessively large OCTET STRING value to a ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-31789**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-31789](https://avd.aquasec.com/nvd/cve-2026-31789)|\u000a\u000aIssue summary: Converting an excessively large OCTET STRING value to\u000aa hexadecimal string leads to a heap buffer overflow on 32 bit platforms.\u000a\u000aImpact summary: A heap buffer overflow may lead to a crash or possibly\u000aan attacker controlled code execution or other undefined behavior.\u000a\u000aIf an attacker can supply a crafted X.509 certificate with an excessively\u000alarge OCTET STRING value in extensions such as the Subject Key Identifier\u000a(SKID) or Authority Key Identifier (AKID) which are being converted to hex,\u000athe size of the buffer needed for the result is calculated as multiplication\u000aof the input length by 3. On 32 bit platforms, this multiplication may overflow\u000aresulting in the allocation of a smaller buffer and a heap buffer overflow.\u000a\u000aApplications and services that print or log contents of untrusted X.509\u000acertificates are vulnerable to this issue. As the certificates would have\u000ato have sizes of over 1 Gigabyte, printing or logging such certificates\u000ais a fairly unlikely operation and only 32 bit platforms are affected,\u000athis issue was assigned Low severity.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\u000aissue, as the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-31789\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-31789](https://avd.aquasec.com/nvd/cve-2026-31789)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2026-31789: : CVE-2026-31789: OsPackageVulnerability\u000a\u000aIssue summary: Converting an excessively large OCTET STRING value to a ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-31789**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-31789](https://avd.aquasec.com/nvd/cve-2026-31789)|\u000a\u000aIssue summary: Converting an excessively large OCTET STRING value to\u000aa hexadecimal string leads to a heap buffer overflow on 32 bit platforms.\u000a\u000aImpact summary: A heap buffer overflow may lead to a crash or possibly\u000aan attacker controlled code execution or other undefined behavior.\u000a\u000aIf an attacker can supply a crafted X.509 certificate with an excessively\u000alarge OCTET STRING value in extensions such as the Subject Key Identifier\u000a(SKID) or Authority Key Identifier (AKID) which are being converted to hex,\u000athe size of the buffer needed for the result is calculated as multiplication\u000aof the input length by 3. On 32 bit platforms, this multiplication may overflow\u000aresulting in the allocation of a smaller buffer and a heap buffer overflow.\u000a\u000aApplications and services that print or log contents of untrusted X.509\u000acertificates are vulnerable to this issue. As the certificates would have\u000ato have sizes of over 1 Gigabyte, printing or logging such certificates\u000ais a fairly unlikely operation and only 32 bit platforms are affected,\u000athis issue was assigned Low severity.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\u000aissue, as the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-31789\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-31789](https://avd.aquasec.com/nvd/cve-2026-31789)",
      "type" : "CVE-2026-31789"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-7e2b0533",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-31789: OsPackageVulnerability\u000a\u000aIssue summary: Converting an excessively large OCTET STRING value to a ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-31789**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-31789](https://avd.aquasec.com/nvd/cve-2026-31789)|\u000a\u000aIssue summary: Converting an excessively large OCTET STRING value to\u000aa hexadecimal string leads to a heap buffer overflow on 32 bit platforms.\u000a\u000aImpact summary: A heap buffer overflow may lead to a crash or possibly\u000aan attacker controlled code execution or other undefined behavior.\u000a\u000aIf an attacker can supply a crafted X.509 certificate with an excessively\u000alarge OCTET STRING value in extensions such as the Subject Key Identifier\u000a(SKID) or Authority Key Identifier (AKID) which are being converted to hex,\u000athe size of the buffer needed for the result is calculated as multiplication\u000aof the input length by 3. On 32 bit platforms, this multiplication may overflow\u000aresulting in the allocation of a smaller buffer and a heap buffer overflow.\u000a\u000aApplications and services that print or log contents of untrusted X.509\u000acertificates are vulnerable to this issue. As the certificates would have\u000ato have sizes of over 1 Gigabyte, printing or logging such certificates\u000ais a fairly unlikely operation and only 32 bit platforms are affected,\u000athis issue was assigned Low severity.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\u000aissue, as the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-31789\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-31789](https://avd.aquasec.com/nvd/cve-2026-31789)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2026-31789: : CVE-2026-31789: OsPackageVulnerability\u000a\u000aIssue summary: Converting an excessively large OCTET STRING value to a ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-31789**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|libssl3|3.5.6-r0|[CVE-2026-31789](https://avd.aquasec.com/nvd/cve-2026-31789)|\u000a\u000aIssue summary: Converting an excessively large OCTET STRING value to\u000aa hexadecimal string leads to a heap buffer overflow on 32 bit platforms.\u000a\u000aImpact summary: A heap buffer overflow may lead to a crash or possibly\u000aan attacker controlled code execution or other undefined behavior.\u000a\u000aIf an attacker can supply a crafted X.509 certificate with an excessively\u000alarge OCTET STRING value in extensions such as the Subject Key Identifier\u000a(SKID) or Authority Key Identifier (AKID) which are being converted to hex,\u000athe size of the buffer needed for the result is calculated as multiplication\u000aof the input length by 3. On 32 bit platforms, this multiplication may overflow\u000aresulting in the allocation of a smaller buffer and a heap buffer overflow.\u000a\u000aApplications and services that print or log contents of untrusted X.509\u000acertificates are vulnerable to this issue. As the certificates would have\u000ato have sizes of over 1 Gigabyte, printing or logging such certificates\u000ais a fairly unlikely operation and only 32 bit platforms are affected,\u000athis issue was assigned Low severity.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\u000aissue, as the affected code is outside the OpenSSL FIPS module boundary.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-31789\u000aSeverity: LOW\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-31789](https://avd.aquasec.com/nvd/cve-2026-31789)",
      "type" : "CVE-2026-31789"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-51588824",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-31790: OsPackageVulnerability\u000a\u000aopenssl: openssl: Information Disclosure from Uninitialized Memory via Invalid RSA Public Key\u000a\u000aFor additional help see: **Vulnerability CVE-2026-31790**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libssl3|3.5.6-r0|[CVE-2026-31790](https://avd.aquasec.com/nvd/cve-2026-31790)|\u000a\u000aIssue summary: Applications using RSASVE key encapsulation to establish\u000aa secret encryption key can send contents of an uninitialized memory buffer to\u000aa malicious peer.\u000a\u000aImpact summary: The uninitialized buffer might contain sensitive data from the\u000aprevious execution of the application process which leads to sensitive data\u000aleakage to an attacker.\u000a\u000aRSA_public_encrypt() returns the number of bytes written on success and -1\u000aon error. The affected code tests only whether the return value is non-zero.\u000aAs a result, if RSA encryption fails, encapsulation can still return success to\u000athe caller, set the output lengths, and leave the caller to use the contents of\u000athe ciphertext buffer as if a valid KEM ciphertext had been produced.\u000a\u000aIf applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an\u000aattacker-supplied invalid RSA public key without first validating that key,\u000athen this may cause stale or uninitialized contents of the caller-provided\u000aciphertext buffer to be disclosed to the attacker in place of the KEM\u000aciphertext.\u000a\u000aAs a workaround calling EVP_PKEY_public_check() or\u000aEVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate\u000athe issue.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-31790\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-31790](https://avd.aquasec.com/nvd/cve-2026-31790)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "NORMAL",
      "toString" : "govway(1,0): CVE-2026-31790: : CVE-2026-31790: OsPackageVulnerability\u000a\u000aopenssl: openssl: Information Disclosure from Uninitialized Memory via Invalid RSA Public Key\u000a\u000aFor additional help see: **Vulnerability CVE-2026-31790**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libssl3|3.5.6-r0|[CVE-2026-31790](https://avd.aquasec.com/nvd/cve-2026-31790)|\u000a\u000aIssue summary: Applications using RSASVE key encapsulation to establish\u000aa secret encryption key can send contents of an uninitialized memory buffer to\u000aa malicious peer.\u000a\u000aImpact summary: The uninitialized buffer might contain sensitive data from the\u000aprevious execution of the application process which leads to sensitive data\u000aleakage to an attacker.\u000a\u000aRSA_public_encrypt() returns the number of bytes written on success and -1\u000aon error. The affected code tests only whether the return value is non-zero.\u000aAs a result, if RSA encryption fails, encapsulation can still return success to\u000athe caller, set the output lengths, and leave the caller to use the contents of\u000athe ciphertext buffer as if a valid KEM ciphertext had been produced.\u000a\u000aIf applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an\u000aattacker-supplied invalid RSA public key without first validating that key,\u000athen this may cause stale or uninitialized contents of the caller-provided\u000aciphertext buffer to be disclosed to the attacker in place of the KEM\u000aciphertext.\u000a\u000aAs a workaround calling EVP_PKEY_public_check() or\u000aEVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate\u000athe issue.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-31790\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-31790](https://avd.aquasec.com/nvd/cve-2026-31790)",
      "type" : "CVE-2026-31790"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-51588824",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-31790: OsPackageVulnerability\u000a\u000aopenssl: openssl: Information Disclosure from Uninitialized Memory via Invalid RSA Public Key\u000a\u000aFor additional help see: **Vulnerability CVE-2026-31790**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libssl3|3.5.6-r0|[CVE-2026-31790](https://avd.aquasec.com/nvd/cve-2026-31790)|\u000a\u000aIssue summary: Applications using RSASVE key encapsulation to establish\u000aa secret encryption key can send contents of an uninitialized memory buffer to\u000aa malicious peer.\u000a\u000aImpact summary: The uninitialized buffer might contain sensitive data from the\u000aprevious execution of the application process which leads to sensitive data\u000aleakage to an attacker.\u000a\u000aRSA_public_encrypt() returns the number of bytes written on success and -1\u000aon error. The affected code tests only whether the return value is non-zero.\u000aAs a result, if RSA encryption fails, encapsulation can still return success to\u000athe caller, set the output lengths, and leave the caller to use the contents of\u000athe ciphertext buffer as if a valid KEM ciphertext had been produced.\u000a\u000aIf applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an\u000aattacker-supplied invalid RSA public key without first validating that key,\u000athen this may cause stale or uninitialized contents of the caller-provided\u000aciphertext buffer to be disclosed to the attacker in place of the KEM\u000aciphertext.\u000a\u000aAs a workaround calling EVP_PKEY_public_check() or\u000aEVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate\u000athe issue.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-31790\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-31790](https://avd.aquasec.com/nvd/cve-2026-31790)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "NORMAL",
      "toString" : "govway(1,0): CVE-2026-31790: : CVE-2026-31790: OsPackageVulnerability\u000a\u000aopenssl: openssl: Information Disclosure from Uninitialized Memory via Invalid RSA Public Key\u000a\u000aFor additional help see: **Vulnerability CVE-2026-31790**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libssl3|3.5.6-r0|[CVE-2026-31790](https://avd.aquasec.com/nvd/cve-2026-31790)|\u000a\u000aIssue summary: Applications using RSASVE key encapsulation to establish\u000aa secret encryption key can send contents of an uninitialized memory buffer to\u000aa malicious peer.\u000a\u000aImpact summary: The uninitialized buffer might contain sensitive data from the\u000aprevious execution of the application process which leads to sensitive data\u000aleakage to an attacker.\u000a\u000aRSA_public_encrypt() returns the number of bytes written on success and -1\u000aon error. The affected code tests only whether the return value is non-zero.\u000aAs a result, if RSA encryption fails, encapsulation can still return success to\u000athe caller, set the output lengths, and leave the caller to use the contents of\u000athe ciphertext buffer as if a valid KEM ciphertext had been produced.\u000a\u000aIf applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an\u000aattacker-supplied invalid RSA public key without first validating that key,\u000athen this may cause stale or uninitialized contents of the caller-provided\u000aciphertext buffer to be disclosed to the attacker in place of the KEM\u000aciphertext.\u000a\u000aAs a workaround calling EVP_PKEY_public_check() or\u000aEVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate\u000athe issue.\u000a\u000aThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.5-r0\u000aVulnerability CVE-2026-31790\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.6-r0\u000aLink: [CVE-2026-31790](https://avd.aquasec.com/nvd/cve-2026-31790)",
      "type" : "CVE-2026-31790"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-734c2411",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-34757: OsPackageVulnerability\u000a\u000aLIBPNG is a reference library for use in applications that read, creat ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-34757**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|UNKNOWN|libpng|1.6.57-r0|[CVE-2026-34757](https://avd.aquasec.com/nvd/cve-2026-34757)|\u000a\u000aLIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.0.9 to before 1.6.57, passing a pointer obtained from png_get_PLTE, png_get_tRNS, or png_get_hIST back into the corresponding setter on the same png_struct/png_info pair causes the setter to read from freed memory and copy its contents into the replacement buffer. The setter frees the internal buffer before copying from the caller-supplied pointer, which now dangles. The freed region may contain stale data (producing silently corrupted chunk metadata) or data from subsequent heap allocations (leaking unrelated heap contents into the chunk struct). This vulnerability is fixed in 1.6.57.\u000a\u000aPackage: libpng\u000aInstalled Version: 1.6.56-r0\u000aVulnerability CVE-2026-34757\u000aSeverity: UNKNOWN\u000aFixed Version: 1.6.57-r0\u000aLink: [CVE-2026-34757](https://avd.aquasec.com/nvd/cve-2026-34757)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2026-34757: : CVE-2026-34757: OsPackageVulnerability\u000a\u000aLIBPNG is a reference library for use in applications that read, creat ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-34757**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|UNKNOWN|libpng|1.6.57-r0|[CVE-2026-34757](https://avd.aquasec.com/nvd/cve-2026-34757)|\u000a\u000aLIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.0.9 to before 1.6.57, passing a pointer obtained from png_get_PLTE, png_get_tRNS, or png_get_hIST back into the corresponding setter on the same png_struct/png_info pair causes the setter to read from freed memory and copy its contents into the replacement buffer. The setter frees the internal buffer before copying from the caller-supplied pointer, which now dangles. The freed region may contain stale data (producing silently corrupted chunk metadata) or data from subsequent heap allocations (leaking unrelated heap contents into the chunk struct). This vulnerability is fixed in 1.6.57.\u000a\u000aPackage: libpng\u000aInstalled Version: 1.6.56-r0\u000aVulnerability CVE-2026-34757\u000aSeverity: UNKNOWN\u000aFixed Version: 1.6.57-r0\u000aLink: [CVE-2026-34757](https://avd.aquasec.com/nvd/cve-2026-34757)",
      "type" : "CVE-2026-34757"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-461d9acf",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-40200: OsPackageVulnerability\u000a\u000aAn issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-40200**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|UNKNOWN|musl-utils|1.2.5-r23|[CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)|\u000a\u000aAn issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).\u000a\u000aPackage: musl\u000aInstalled Version: 1.2.5-r21\u000aVulnerability CVE-2026-40200\u000aSeverity: UNKNOWN\u000aFixed Version: 1.2.5-r23\u000aLink: [CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2026-40200: : CVE-2026-40200: OsPackageVulnerability\u000a\u000aAn issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-40200**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|UNKNOWN|musl-utils|1.2.5-r23|[CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)|\u000a\u000aAn issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).\u000a\u000aPackage: musl\u000aInstalled Version: 1.2.5-r21\u000aVulnerability CVE-2026-40200\u000aSeverity: UNKNOWN\u000aFixed Version: 1.2.5-r23\u000aLink: [CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)",
      "type" : "CVE-2026-40200"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-461d9acf",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-40200: OsPackageVulnerability\u000a\u000aAn issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-40200**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|UNKNOWN|musl-utils|1.2.5-r23|[CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)|\u000a\u000aAn issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).\u000a\u000aPackage: musl-utils\u000aInstalled Version: 1.2.5-r21\u000aVulnerability CVE-2026-40200\u000aSeverity: UNKNOWN\u000aFixed Version: 1.2.5-r23\u000aLink: [CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1398",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2026-40200: : CVE-2026-40200: OsPackageVulnerability\u000a\u000aAn issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based ...\u000a\u000aFor additional help see: **Vulnerability CVE-2026-40200**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|UNKNOWN|musl-utils|1.2.5-r23|[CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)|\u000a\u000aAn issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).\u000a\u000aPackage: musl-utils\u000aInstalled Version: 1.2.5-r21\u000aVulnerability CVE-2026-40200\u000aSeverity: UNKNOWN\u000aFixed Version: 1.2.5-r23\u000aLink: [CVE-2026-40200](https://avd.aquasec.com/nvd/cve-2026-40200)",
      "type" : "CVE-2026-40200"
    }
  ],
  "size" : 17,
  "toString" : "17 warnings (high: 2, normal: 2, low: 13)"
}