RLSA-2026:11514

Source
https://errata.rockylinux.org/RLSA-2026:11514
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2026:11514.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2026:11514
Upstream
  • CVE-2026-32280
  • CVE-2026-32282
  • CVE-2026-32283
Published
2026-05-06T12:00:32.501695Z
Modified
2026-05-06T12:30:44.553415Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Important: grafana-pcp security update
Details

The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.

Security Fix(es):

  • golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root (CVE-2026-32282)

  • crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages (CVE-2026-32283)

  • crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building (CVE-2026-32280)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / grafana-pcp

Package

Name
grafana-pcp
Purl
pkg:rpm/rocky-linux/grafana-pcp?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:5.1.1-14.el8_10
Database specific
{
    "yum_repository": "AppStream"
}

Database specific

source
"https://storage.googleapis.com/resf-osv-data/RLSA-2026:11514.json"