{"id":"RHSA-2026:17084","summary":"Red Hat Security Advisory: gvisor-tap-vsock security update","modified":"2026-05-15T10:14:54Z","published":"2026-05-14T10:05:33Z","related":["GO-2025-4155","GO-2026-4337","GO-2026-4341","GO-2026-4601","GO-2026-4864","GO-2026-4870","GO-2026-4947"],"upstream":["CVE-2025-61726","CVE-2025-61729","CVE-2025-68121","CVE-2026-25679","CVE-2026-32280","CVE-2026-32282","CVE-2026-32283"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:17084"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418462"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2434432"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2437111"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2445356"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2456336"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2456338"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2456339"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_17084.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-61726"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-61726"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61726"},{"type":"ARTICLE","url":"https://go.dev/cl/736712"},{"type":"ARTICLE","url":"https://go.dev/issue/77101"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2026-4341"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-61729"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-61729"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61729"},{"type":"ARTICLE","url":"https://go.dev/cl/725920"},{"type":"ARTICLE","url":"https://go.dev/issue/76445"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2025-4155"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-68121"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-68121"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68121"},{"type":"ARTICLE","url":"https://go.dev/cl/737700"},{"type":"ARTICLE","url":"https://go.dev/issue/77217"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2026-4337"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-25679"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2026-25679"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-25679"},{"type":"ARTICLE","url":"https://go.dev/cl/752180"},{"type":"ARTICLE","url":"https://go.dev/issue/77578"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2026-4601"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-32280"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2026-32280"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32280"},{"type":"ARTICLE","url":"https://go.dev/cl/758320"},{"type":"ARTICLE","url":"https://go.dev/issue/78282"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2026-4947"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-32282"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2026-32282"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32282"},{"type":"ARTICLE","url":"https://go.dev/cl/763761"},{"type":"ARTICLE","url":"https://go.dev/issue/78293"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2026-4864"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-32283"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2026-32283"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32283"},{"type":"ARTICLE","url":"https://go.dev/cl/763767"},{"type":"ARTICLE","url":"https://go.dev/issue/78334"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2026-4870"}],"affected":[{"package":{"name":"gvisor-tap-vsock","ecosystem":"Red Hat:enterprise_linux_eus:10.0","purl":"pkg:rpm/redhat/gvisor-tap-vsock"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6:0.8.5-2.el10_0.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:17084.json"}},{"package":{"name":"gvisor-tap-vsock-debuginfo","ecosystem":"Red Hat:enterprise_linux_eus:10.0","purl":"pkg:rpm/redhat/gvisor-tap-vsock-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6:0.8.5-2.el10_0.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:17084.json"}},{"package":{"name":"gvisor-tap-vsock-debugsource","ecosystem":"Red Hat:enterprise_linux_eus:10.0","purl":"pkg:rpm/redhat/gvisor-tap-vsock-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6:0.8.5-2.el10_0.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:17084.json"}},{"package":{"name":"gvisor-tap-vsock-gvforwarder","ecosystem":"Red Hat:enterprise_linux_eus:10.0","purl":"pkg:rpm/redhat/gvisor-tap-vsock-gvforwarder"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6:0.8.5-2.el10_0.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:17084.json"}},{"package":{"name":"gvisor-tap-vsock-gvforwarder-debuginfo","ecosystem":"Red Hat:enterprise_linux_eus:10.0","purl":"pkg:rpm/redhat/gvisor-tap-vsock-gvforwarder-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6:0.8.5-2.el10_0.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:17084.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}