{
    "document": {
        "category": "csaf_base",
        "csaf_version": "2.0",
        "distribution": {
            "tlp": {
                "label": "WHITE"
            }
        },
        "lang": "en",
        "notes": [
            {
                "category": "legal_disclaimer",
                "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this portal to enhance access to its information and vulnerabilities. The use of this information is subject to the following terms and conditions:\n\nThe vulnerabilities disclosed in this portal are gathered by NCSC-NL from a variety of open sources, which the user can retrieve from other platforms. NCSC-NL makes every reasonable effort to ensure that the content of this portal is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or real-time keeping up-to-date. NCSC-NL does not control nor guarantee the accuracy, relevance, timeliness or completeness of information obtained from these external sources. The vulnerabilities disclosed in this portal are intended solely for the convenience of professional parties to take appropriate measures to manage the risks posed to the cybersecurity. No rights can be derived from the information provided therein.\n\nNCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of the vulnerabilities disclosed in this portal. This includes damage resulting from the inaccuracy of incompleteness of the information contained in it.\nThe information on this page is subject to Dutch law. All disputes related to or arising from the use of this portal regarding the disclosure of vulnerabilities will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
            }
        ],
        "publisher": {
            "category": "coordinator",
            "contact_details": "cert@ncsc.nl",
            "name": "National Cyber Security Centre",
            "namespace": "https://www.ncsc.nl/"
        },
        "title": "CVE-2026-27138",
        "tracking": {
            "current_release_date": "2026-04-01T11:28:45.785237Z",
            "generator": {
                "date": "2026-02-17T15:00:00Z",
                "engine": {
                    "name": "V.E.L.M.A",
                    "version": "1.7"
                }
            },
            "id": "CVE-2026-27138",
            "initial_release_date": "2026-02-27T11:05:47.077459Z",
            "revision_history": [
                {
                    "date": "2026-02-27T11:05:47.077459Z",
                    "number": "1",
                    "summary": "CVE created.| Source connected.| CVE status created. (valid)| Products connected (2).| References created (3)."
                },
                {
                    "date": "2026-02-27T11:05:51.817719Z",
                    "number": "2",
                    "summary": "NCSC Score created."
                },
                {
                    "date": "2026-03-06T22:24:40.070555Z",
                    "number": "3",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| References created (4)."
                },
                {
                    "date": "2026-03-06T22:24:50.297453Z",
                    "number": "4",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-06T22:39:00.210098Z",
                    "number": "5",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| Products connected (1).| References created (4)."
                },
                {
                    "date": "2026-03-06T22:39:03.379393Z",
                    "number": "6",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-07T00:46:28.829979Z",
                    "number": "7",
                    "summary": "Source created.| CVE status created. (valid)| Products connected (2)."
                },
                {
                    "date": "2026-03-07T06:42:55.600363Z",
                    "number": "8",
                    "summary": "Description created for source."
                },
                {
                    "date": "2026-03-07T14:49:57.779680Z",
                    "number": "9",
                    "summary": "Source created.| CVE status created. (valid)| EPSS created."
                },
                {
                    "date": "2026-03-07T14:50:03.246971Z",
                    "number": "10",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-08T06:38:50.552284Z",
                    "number": "11",
                    "summary": "Products connected (1).| Products removed (1)."
                },
                {
                    "date": "2026-03-09T06:12:43.733642Z",
                    "number": "12",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| References created (3)."
                },
                {
                    "date": "2026-03-10T10:15:11.718933Z",
                    "number": "13",
                    "summary": "Products connected (1).| References created (1)."
                },
                {
                    "date": "2026-03-10T10:15:14.575036Z",
                    "number": "14",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-10T12:05:47.210017Z",
                    "number": "15",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| Products connected (1).| References created (5)."
                },
                {
                    "date": "2026-03-10T12:05:52.243278Z",
                    "number": "16",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-10T13:38:54.560108Z",
                    "number": "17",
                    "summary": "CVSS created.| Unknown change."
                },
                {
                    "date": "2026-03-10T13:39:06.073818Z",
                    "number": "18",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-10T18:28:30.317740Z",
                    "number": "19",
                    "summary": "CVSS created."
                },
                {
                    "date": "2026-03-10T18:28:37.487497Z",
                    "number": "20",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-11T12:19:49.560738Z",
                    "number": "21",
                    "summary": "Source connected.| CVE status created. (valid)| Description created for source.| CVSS created."
                },
                {
                    "date": "2026-03-11T12:19:55.158312Z",
                    "number": "22",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-11T12:28:23.976996Z",
                    "number": "23",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (16).| Product Identifiers created (8).| Product Remediations created (16).| References created (6).| CWES updated (1).| Vendor_assessment created."
                },
                {
                    "date": "2026-03-11T12:28:28.102607Z",
                    "number": "24",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-12T10:26:25.702326Z",
                    "number": "25",
                    "summary": "Products connected (1).| References created (2)."
                },
                {
                    "date": "2026-03-12T10:26:27.918475Z",
                    "number": "26",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-14T00:21:47.750420Z",
                    "number": "27",
                    "summary": "Products connected (2)."
                },
                {
                    "date": "2026-03-14T12:20:05.255017Z",
                    "number": "28",
                    "summary": "Product Remediations created (2)."
                },
                {
                    "date": "2026-03-14T12:20:13.424693Z",
                    "number": "29",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-17T00:19:55.160569Z",
                    "number": "30",
                    "summary": "Product Remediations removed (2)."
                },
                {
                    "date": "2026-03-17T00:20:01.330219Z",
                    "number": "31",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-17T12:19:53.407067Z",
                    "number": "32",
                    "summary": "Product Remediations created (2)."
                },
                {
                    "date": "2026-03-17T12:19:56.261610Z",
                    "number": "33",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-20T09:42:26.970655Z",
                    "number": "34",
                    "summary": "Source connected.| CVE status created. (valid)| EPSS created."
                },
                {
                    "date": "2026-03-20T09:42:29.880446Z",
                    "number": "35",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-20T20:24:31.628721Z",
                    "number": "36",
                    "summary": "Products connected (1).| References created (2)."
                },
                {
                    "date": "2026-03-20T20:24:35.208240Z",
                    "number": "37",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-23T11:54:48.623506Z",
                    "number": "38",
                    "summary": "Products connected (1).| References created (2)."
                },
                {
                    "date": "2026-03-23T11:54:50.971381Z",
                    "number": "39",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-25T01:04:00.968838Z",
                    "number": "40",
                    "summary": "References created (3)."
                },
                {
                    "date": "2026-03-25T01:04:04.339608Z",
                    "number": "41",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-25T10:14:40.126888Z",
                    "number": "42",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-03-25T10:14:43.178238Z",
                    "number": "43",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-25T18:46:37.165554Z",
                    "number": "44",
                    "summary": "Source connected.| CVE status created. (valid)| Description created for source.| Products connected (4).| References created (12)."
                },
                {
                    "date": "2026-03-27T11:56:46.423621Z",
                    "number": "45",
                    "summary": "Products connected (1).| References created (6)."
                },
                {
                    "date": "2026-03-27T11:56:49.158234Z",
                    "number": "46",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-04-01T11:28:44.474163Z",
                    "number": "47",
                    "summary": "References created (1)."
                }
            ],
            "status": "interim",
            "version": "47"
        }
    },
    "product_tree": {
        "branches": [
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/unknown",
                                "product": {
                                    "name": "vers:unknown/unknown",
                                    "product_id": "CSAFPID-1330296",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:amazon:linux_2:-"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Amazon Linux 2"
                    }
                ],
                "category": "vendor",
                "name": "Amazon"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/<1.25.8",
                                "product": {
                                    "name": "vers:unknown/<1.25.8",
                                    "product_id": "CSAFPID-5734989"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/<1.26.1",
                                "product": {
                                    "name": "vers:unknown/<1.26.1",
                                    "product_id": "CSAFPID-5734988"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Go"
                    }
                ],
                "category": "vendor",
                "name": "Golang"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/2",
                                "product": {
                                    "name": "vers:rpm/2",
                                    "product_id": "CSAFPID-1488100",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/a:redhat:service_mesh:2"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "OpenShift Service Mesh 2"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/3",
                                "product": {
                                    "name": "vers:rpm/3",
                                    "product_id": "CSAFPID-2942231",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/a:redhat:service_mesh:3"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "OpenShift Service Mesh 3"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/unknown",
                                "product": {
                                    "name": "vers:unknown/unknown",
                                    "product_id": "CSAFPID-1317175",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat Enterprise Linux"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/10",
                                "product": {
                                    "name": "vers:rpm/10",
                                    "product_id": "CSAFPID-2858634",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:redhat:enterprise_linux:10"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat Enterprise Linux 10"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/8",
                                "product": {
                                    "name": "vers:rpm/8",
                                    "product_id": "CSAFPID-1439317",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/a:redhat:enterprise_linux:8"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat Enterprise Linux 8"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/9",
                                "product": {
                                    "name": "vers:rpm/9",
                                    "product_id": "CSAFPID-1439319",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:redhat:enterprise_linux:9"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat Enterprise Linux 9"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/3",
                                "product": {
                                    "name": "vers:rpm/3",
                                    "product_id": "CSAFPID-5198605",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/a:redhat:enterprise_linux_ai:3"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat Enterprise Linux AI (RHEL AI) 3"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/4",
                                "product": {
                                    "name": "vers:rpm/4",
                                    "product_id": "CSAFPID-1439328",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/a:redhat:openshift:4"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat OpenShift Container Platform 4"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/4",
                                "product": {
                                    "name": "vers:rpm/4",
                                    "product_id": "CSAFPID-1441162",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/a:redhat:container_native_virtualization:4"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat OpenShift Virtualization 4"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-2914837"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "golang"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat Enterprise Linux 10"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-1919988"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "golang"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat Enterprise Linux 8"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-1919995"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "golang"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat Enterprise Linux 9"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-5593257"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "golang"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat Enterprise Linux AI (RHEL AI) 3"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-1919975"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "openshift-golang-builder-container"
                            }
                        ],
                        "category": "product_family",
                        "name": "OpenShift Service Mesh 2"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-5593234"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "openshift-golang-builder-container"
                            }
                        ],
                        "category": "product_family",
                        "name": "OpenShift Service Mesh 3"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-1920009"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "openshift-golang-builder-container"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat OpenShift Container Platform 4"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-1920015"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "openshift-golang-builder-container"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat OpenShift Virtualization 4"
                    }
                ],
                "category": "vendor",
                "name": "Red Hat"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/unknown",
                                "product": {
                                    "name": "vers:unknown/unknown",
                                    "product_id": "CSAFPID-1317177",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:oracle:linux:-"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Oracle Linux"
                    }
                ],
                "category": "vendor",
                "name": "Oracle"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/unknown",
                                "product": {
                                    "name": "vers:unknown/unknown",
                                    "product_id": "CSAFPID-1317176",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:suse:opensuse:-"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "SUSE openSUSE"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/unknown",
                                "product": {
                                    "name": "vers:unknown/unknown",
                                    "product_id": "CSAFPID-1317174",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:suse:suse_linux:-"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "SuSE Linux"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<1.26.1-150600.13.3.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<1.26.1-150600.13.3.1",
                                            "product_id": "CSAFPID-5908690"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "go1.26-openssl"
                            }
                        ],
                        "category": "product_family",
                        "name": "SUSE:Linux Enterprise Module for Development Tools 15 SP7"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<1.26.1-150600.13.3.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<1.26.1-150600.13.3.1",
                                            "product_id": "CSAFPID-5908691"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "go1.26-openssl"
                            }
                        ],
                        "category": "product_family",
                        "name": "SUSE:Linux Enterprise Server 15 SP6-LTSS"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<1.26.1-150600.13.3.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<1.26.1-150600.13.3.1",
                                            "product_id": "CSAFPID-5908692"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "go1.26-openssl"
                            }
                        ],
                        "category": "product_family",
                        "name": "SUSE:Linux Enterprise Server for SAP Applications 15 SP6"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:unknown/>=0|<1.26.1-150600.13.3.1",
                                        "product": {
                                            "name": "vers:unknown/>=0|<1.26.1-150600.13.3.1",
                                            "product_id": "CSAFPID-5908693"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "go1.26-openssl"
                            }
                        ],
                        "category": "product_family",
                        "name": "openSUSE:Leap 15.6"
                    }
                ],
                "category": "vendor",
                "name": "SUSE"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:microsoft/*",
                                        "product": {
                                            "name": "vers:microsoft/*",
                                            "product_id": "CSAFPID-5826711",
                                            "product_identification_helper": {
                                                "cpe": "cpe:2.3:a:microsoft:azl3_golang_1.25.7-1:*:*:*:*:*:*:*:*"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "azl3 golang 1.25.7-1 on Azure Linux 3.0"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:microsoft/*",
                                        "product": {
                                            "name": "vers:microsoft/*",
                                            "product_id": "CSAFPID-5826712",
                                            "product_identification_helper": {
                                                "cpe": "cpe:2.3:a:microsoft:azl3_golang_1.26.0-1:*:*:*:*:*:*:*:*"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "azl3 golang 1.26.0-1 on Azure Linux 3.0"
                            }
                        ],
                        "category": "product_family",
                        "name": "Open Source Software"
                    }
                ],
                "category": "vendor",
                "name": "Microsoft"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:semver/1.26.0-0|<1.26.1",
                                "product": {
                                    "name": "vers:semver/1.26.0-0|<1.26.1",
                                    "product_id": "CSAFPID-5770310"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "crypto/x509"
                    }
                ],
                "category": "vendor",
                "name": "Go standard library"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=1.26.0-0|<1.26.1",
                                "product": {
                                    "name": "vers:unknown/>=1.26.0-0|<1.26.1",
                                    "product_id": "CSAFPID-5774487"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "golang"
                    }
                ],
                "category": "vendor",
                "name": "Bitnami"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:deb/*",
                                        "product": {
                                            "name": "vers:deb/*",
                                            "product_id": "CSAFPID-1396505"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "golang-1.15"
                            }
                        ],
                        "category": "product_family",
                        "name": "bullseye"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:deb/*",
                                        "product": {
                                            "name": "vers:deb/*",
                                            "product_id": "CSAFPID-1396506"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "golang-1.19"
                            }
                        ],
                        "category": "product_family",
                        "name": "bookworm"
                    }
                ],
                "category": "vendor",
                "name": "Debian"
            }
        ]
    },
    "vulnerabilities": [
        {
            "cve": "CVE-2026-27138",
            "cwe": {
                "id": "CWE-295",
                "name": "Improper Certificate Validation"
            },
            "notes": [
                {
                    "category": "description",
                    "text": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.",
                    "title": "nvd - https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
                },
                {
                    "category": "description",
                    "text": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.",
                    "title": "cveprojectv5 - https://www.cve.org/CVERecord?id=CVE-2026-27138"
                },
                {
                    "category": "description",
                    "text": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.",
                    "title": "debian - https://security-tracker.debian.org/tracker/CVE-2026-27138"
                },
                {
                    "category": "description",
                    "text": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGO-2026-4600.json?alt=media"
                },
                {
                    "category": "description",
                    "text": "Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Bitnami%2FBIT-golang-2026-27138.json?alt=media"
                },
                {
                    "category": "description",
                    "text": "Panic in name constraint checking for malformed certificates in crypto/x509",
                    "title": "microsoft - https://api.msrc.microsoft.com/cvrf/v3.0/cvrf/2026-Mar"
                },
                {
                    "category": "description",
                    "text": "No description is available for this CVE.",
                    "title": "redhat - https://access.redhat.com/security/cve/CVE-2026-27138"
                },
                {
                    "category": "description",
                    "text": "This update for go1.26-openssl fixes the following issues:\n\nUpdate to go 1.26.1 (bsc#1255111, jsc#SLE-18320):\n\n- CVE-2026-25679: net/url: reject IPv6 literal not at start of host (bsc#1259264).\n- CVE-2026-27137: crypto/x509: incorrect enforcement of email constraints (bsc#1259266).\n- CVE-2026-27138: crypto/x509: panic in name constraint checking for malformed certificates (bsc#1259267).\n- CVE-2026-27139: os: FileInfo can escape from a Root (bsc#1259268).\n- CVE-2026-27142: html/template: URLs in meta content attribute actions are not escaped (bsc#1259265).\n\nChangelog:\n\n * Fix fips140only test in boring mode\n * Fix fips140 only test\n * Add GODEBUG=fips140=auto mode (#341)\n * go#77252 cmd/compile: miscompile of global array initialization\n * go#77407 os: Go 1.25.x regression on RemoveAll for windows\n * go#77474 cmd/go: CGO compilation fails after upgrading from Go 1.25.5 to 1.25.6 due to --define-variable flag in \n   pkg-config\n * go#77529 cmd/fix, x/tools/go/analysis/passes/modernize: stringscut: OOB panic in indexArgValid analyzing \n   'buf.Bytes()' call\n * go#77532 net/smtp: expiry date of localhostCert for testing is too short\n * go#77536 cmd/compile: internal compiler error: 'main.func1': not lowered: v15, Load STRUCT PTR SSA\n * go#77618 strings: HasSuffix doesn't work correctly for multibyte runes in go 1.26\n * go#77623 cmd/compile: internal compiler error on : 'tried to free an already free register' with generic function \n   and type >= 192 bytes\n * go#77624 cmd/fix, x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when combining two \n   strings.Builders\n * go#77680 cmd/link: TestFlagW/-w_-linkmode=external fails on illumos\n * go#77766 cmd/fix,x/tools/go/analysis/passes/modernize: rangeint uses target platform's type in the range \n   expression, breaking other platforms\n * go#77780 reflect: breaking change for reflect.Value.Interface behaviour\n * go#77786 cmd/compile: rewriteFixedLoad does not properly sign extend AuxInt\n * go#77803 cmd/fix,x/tools/go/analysis/passes/modernize: reflect.TypeOf(nil) transformed into\n   reflect.TypeFor[untyped nil]()\n * go#77804 cmd/fix,x/tools/go/analysis/passes/modernize: minmax breaks select statements\n * go#77805 cmd/fix, x/tools/go/analysis/passes/modernize: waitgroup leads to a compilation error\n * go#77807 cmd/fix,x/tools/go/analysis/passes/modernize: stringsbuilder ignores variables if they are used multiple \n   times\n * go#77849 cmd/fix,x/tools/go/analysis/passes/modernize: stringscut rewrite changes behavior\n * go#77860 cmd/go: change go mod init default go directive back to 1.N\n * go#77899 cmd/fix, x/tools/go/analysis/passes/modernize: bad rangeint rewriting\n * go#77904 x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when GenDecl is a block declaration\n  \n- go1.26.0 (released 2026-02-10) is a major release of Go.\n go1.26.x minor releases will be provided through February 2027.\n https://github.com/golang/go/wiki/Go-Release-Cycle\n go1.26 arrives six months after Go 1.25. Most of its changes are\n in the implementation of the toolchain, runtime, and\n libraries. As always, the release maintains the Go 1 promise of\n compatibility. We expect almost all Go programs to continue to\n compile and run as before.\n * Language change: The built-in new function, which creates a new\n variable, now allows its operand to be an expression,\n specifying the initial value of the variable.\n * Language change: The restriction that a generic type may not\n refer to itself in its type parameter list has been lifted. It\n is now possible to specify type constraints that refer to the\n generic type being constrained.\n * go command: The venerable go fix command has been completely\n revamped and is now the home of Go's modernizers. It provides a\n dependable, push-button way to update Go code bases to the\n latest idioms and core library APIs. The initial suite of\n modernizers includes dozens of fixers to make use of modern\n features of the Go language and library, as well a source-level\n inliner that allows users to automate their own API migrations\n using //go:fix inline directives. These fixers should not\n change the behavior of your program, so if you encounter any\n issues with a fix performed by go fix, please report it.\n * go command: The rewritten go fix command builds atop the exact\n same Go analysis framework as go vet. This means the same\n analyzers that provide diagnostics in go vet can be used to\n suggest and apply fixes in go fix. The go fix command's\n historical fixers, all of which were obsolete, have been\n removed.\n * go command: Two upcoming Go blog posts will go into more detail\n on modernizers, the inliner, and how to get the most out of go\n fix.\n * go command: go mod init now defaults to a lower go version in\n new go.mod files. Running go mod init using a toolchain of\n version 1.N.X will create a go.mod file specifying the Go\n version go 1.(N-1).0. Pre-release versions of 1.N will create\n go.mod files specifying go 1.(N-2).0. For example, the Go 1.26\n release candidates will create go.mod files with go 1.24.0, and\n Go 1.26 and its minor releases will create go.mod files with go\n 1.25.0. This is intended to encourage the creation of modules\n that are compatible with currently supported versions of\n Go. For additional control over the go version in new modules,\n go mod init can be followed up with go get go@version.\n * go command: cmd/doc, and go tool doc have been deleted. go doc\n can be used as a replacement for go tool doc: it takes the same\n flags and arguments and has the same behavior.\n * pprof: The pprof tool web UI, enabled with the -http flag, now\n defaults to the flame graph view. The previous graph view is\n available in the 'View -> Graph' menu, or via /ui/graph.\n * Runtime: The new Green Tea garbage collector, previously\n available as an experiment in Go 1.25, is now enabled by\n default after incorporating feedback. This garbage collector's\n design improves the performance of marking and scanning small\n objects through better locality and CPU scalability. Benchmark\n results vary, but we expect somewhere between a 10--40%\n reduction in garbage collection overhead in real-world programs\n that heavily use the garbage collector. Further improvements,\n on the order of 10% in garbage collection overhead, are\n expected when running on newer amd64-based CPU platforms (Intel\n Ice Lake or AMD Zen 4 and newer), as the garbage collector now\n leverages vector instructions for scanning small objects when\n possible. The new garbage collector may be disabled by setting\n GOEXPERIMENT=nogreenteagc at build time. This opt-out setting\n is expected to be removed in Go 1.27. If you disable the new\n garbage collector for any reason related to its performance or\n behavior, please file an issue.\n * Runtime: cgo: The baseline runtime overhead of cgo calls has\n been reduced by ~30%.\n * Runtime: Heap base address randomization: On 64-bit platforms,\n the runtime now randomizes the heap base address at\n startup. This is a security enhancement that makes it harder\n for attackers to predict memory addresses and exploit\n vulnerabilities when using cgo. This feature may be disabled by\n setting GOEXPERIMENT=norandomizedheapbase64 at build time. This\n opt-out setting is expected to be removed in a future Go\n release.\n * Runtime: Experimental goroutine leak profile: A new profile\n type that reports leaked goroutines is now available as an\n experiment. The new profile type, named goroutineleak in the\n runtime/pprof package, may be enabled by setting\n GOEXPERIMENT=goroutineleakprofile at build time. Enabling the\n experiment also makes the profile available as a net/http/pprof\n endpoint, /debug/pprof/goroutineleak. A leaked goroutine is a\n goroutine blocked on some concurrency primitive (channels,\n sync.Mutex, sync.Cond, etc) that cannot possibly become\n unblocked. The runtime detects leaked goroutines using the\n garbage collector: if a goroutine G is blocked on concurrency\n primitive P, and P is unreachable from any runnable goroutine\n or any goroutine that those could unblock, then P cannot be\n unblocked, so goroutine G can never wake up. While it is\n impossible to detect permanently blocked goroutines in all\n cases, this approach detects a large class of such\n leaks. Because this technique builds on reachability, the\n runtime may fail to identify leaks caused by blocking on\n concurrency primitives reachable through global variables or\n the local variables of runnable goroutines. Special thanks to\n Vlad Saioc at Uber for contributing this work. The underlying\n theory is presented in detail in a publication by Saioc et\n al. The implementation is production-ready, and is only\n considered an experiment for the purposes of collecting\n feedback on the API, specifically the choice to make it a new\n profile. The feature is also designed to not incur any\n additional run-time overhead unless it is actively in-use. We\n encourage users to try out the new feature in the Go\n playground, in tests, in continuous integration, and in\n production. We welcome additional feedback on the proposal\n issue. We aim to enable goroutine leak profiles by default in\n Go 1.27.\n * Compiler: The compiler can now allocate the backing store for\n slices on the stack in more situations, which improves\n performance. If this change is causing trouble, the bisect tool\n can be used to find the allocation causing trouble using the\n -compile=variablemake flag. All such new stack allocations can\n also be turned off using -gcflags=all=-d=variablemakehash=n. If\n you encounter issues with this optimization, please file an\n issue.\n * Linker: On 64-bit ARM-based Windows (the windows/arm64 port),\n the linker now supports internal linking mode of cgo programs,\n which can be requested with the -ldflags=-linkmode=internal\n flag.\n * Linker: There are several minor changes to executable\n files. These changes do not affect running Go programs. They\n may affect programs that analyze Go executables, and they may\n affect people who use external linking mode with custom linker\n scripts.\n * Linker: The moduledata structure is now in its own section,\n named .go.module.\n * Linker: The moduledata cutab field, which is a slice, now has\n the correct length; previously the length was four times too\n large.\n * Linker: The pcHeader found at the start of the .gopclntab\n section no longer records the start of the text section. That\n field is now always zero.\n * Linker: That pcHeader change was made so that the .gopclntab\n section no longer contains any relocations. On platforms that\n support relro, the section has moved from the relro segment to\n the rodata segment.\n * Linker: The funcdata symbols and the findfunctab have moved\n from the .rodata section to the .gopclntab section.\n * Linker: The .gosymtab section has been removed. It was\n previously always present but empty.\n * Linker: When using internal linking, ELF sections now appear in\n the section header list sorted by address. The previous order\n was somewhat unpredictable.\n * Linker: The references to section names here use the ELF names\n as seen on Linux and other systems. The Mach-O names as seen on\n Darwin start with a double underscore and do not contain any\n dots.\n * Bootstrap: As mentioned in the Go 1.24 release notes, Go 1.26\n now requires Go 1.24.6 or later for bootstrap. We expect that\n Go 1.28 will require a minor release of Go 1.26 or later for\n bootstrap.\n * Standard Library: New crypto/hpke package: The new crypto/hpke\n package implements Hybrid Public Key Encryption (HPKE) as\n specified in RFC 9180, including support for post-quantum\n hybrid KEMs.\n * Standard Library: New experimental simd/archsimd package: Go\n 1.26 introduces a new experimental simd/archsimd package, which\n can be enabled by setting the environment variable\n GOEXPERIMENT=simd at build time. This package provides access\n to architecture-specific SIMD operations. It is currently\n available on the amd64 architecture and supports 128-bit,\n 256-bit, and 512-bit vector types, such as Int8x16 and\n Float64x8, with operations such as Int8x16.Add. The API is not\n yet considered stable. We intend to provide support for other\n architectures in future versions, but the API intentionally\n architecture-specific and thus non-portable. In addition, we\n plan to develop a high-level portable SIMD package in the\n future.\n * Standard Library: New experimental runtime/secret package: The\n new runtime/secret package is available as an experiment, which\n GOEXPERIMENT=runtimesecret at build time. It provides a\n facility for securely erasing temporaries used in code that\n manipulates secret information--typically cryptographic in\n nature--such as registers, stack, new heap allocations. This\n package is intended to make it easier to ensure forward\n secrecy. It currently supports the amd64 and arm64\n architectures on Linux.\n * bytes: The new Buffer.Peek method returns the next n bytes from\n the buffer without advancing it.\n * crypto: The new Encapsulator and Decapsulator interfaces allow\n accepting abstract KEM encapsulation or decapsulation keys.\n * crypto/dsa: The random parameter to GenerateKey is now\n ignored. Instead, it now always uses a secure source of\n cryptographically random bytes. For deterministic testing, use\n the new testing/cryptotest.SetGlobalRandom function. The new\n GODEBUG setting cryptocustomrand=1 temporarily restores the old\n behavior.\n * crypto/ecdh: The random parameter to Curve.GenerateKey is now\n behavior. The new KeyExchanger interface, implemented by\n PrivateKey, makes it possible to accept abstract ECDH private\n keys, e.g. those implemented in hardware.\n * crypto/ecdsa: The big.Int fields of PublicKey and PrivateKey\n are now deprecated. The random parameter to GenerateKey,\n SignASN1, Sign, and PrivateKey.Sign is now ignored. Instead,\n they now always use a secure source of cryptographically random\n bytes. For deterministic testing, use the new\n testing/cryptotest.SetGlobalRandom function. The new GODEBUG\n setting cryptocustomrand=1 temporarily restores the old\n * crypto/ed25519: If the random parameter to GenerateKey is nil,\n GenerateKey now always uses a secure source of\n cryptographically random bytes, instead of crypto/rand.Reader\n (which could have been overridden). The new GODEBUG setting\n cryptocustomrand=1 temporarily restores the old behavior.\n * crypto/fips140: The new WithoutEnforcement and Enforced\n functions now allow running in GODEBUG=fips140=only mode while\n selectively disabling the strict FIPS 140-3 checks. Version\n returns the resolved FIPS 140-3 Go Cryptographic Module version\n when building against a frozen module with GOFIPS140.\n * crypto/mlkem: The new DecapsulationKey768.Encapsulator and\n DecapsulationKey1024.Encapsulator methods implement the new\n crypto.Decapsulator interface.\n * crypto/mlkem/mlkemtest: The new crypto/mlkem/mlkemtest package\n exposes the Encapsulate768 and Encapsulate1024 functions which\n implement derandomized ML-KEM encapsulation, for use with\n known-answer tests.\n * crypto/rand: The random parameter to Prime is now\n * crypto/rsa: The new EncryptOAEPWithOptions function allows\n specifying different hash functions for OAEP padding and MGF1\n mask generation.\n * crypto/rsa: The random parameter to GenerateKey,\n GenerateMultiPrimeKey, and EncryptPKCS1v15 is now\n ignored. Instead, they now always use a secure source of\n * crypto/rsa: If PrivateKey fields are modified after calling\n PrivateKey.Precompute, PrivateKey.Validate now fails.\n * crypto/rsa: PrivateKey.D is now checked for consistency with\n precomputed values, even if it is not used.\n * crypto/rsa: Unsafe PKCS #1 v1.5 encryption padding (implemented\n by EncryptPKCS1v15, DecryptPKCS1v15, and\n DecryptPKCS1v15SessionKey) is now deprecated.\n * crypto/subtle: The WithDataIndependentTiming function no longer\n locks the calling goroutine to the OS thread while executing\n the passed function. Additionally, any goroutines which are\n spawned during the execution of the passed function and their\n descendants now inherit the properties of\n WithDataIndependentTiming for their lifetime. This change also\n affects cgo in the following ways:\n * crypto/subtle: Any C code called via cgo from within the\n function passed to WithDataIndependentTiming, or from a\n goroutine spawned by the function passed to\n WithDataIndependentTiming and its descendants, will also have\n data independent timing enabled for the duration of the\n call. If the C code disables data independent timing, it will\n be re-enabled on return to Go.\n * crypto/subtle: If C code called via cgo, from the function\n passed to WithDataIndependentTiming or elsewhere, enables or\n disables data independent timing then calling into Go will\n preserve that state for the duration of the call.\n * crypto/tls: The hybrid SecP256r1MLKEM768 and SecP384r1MLKEM1024\n post-quantum key exchanges are now enabled by default. They can\n be disabled by setting Config.CurvePreferences or with the\n tlssecpmlkem=0 GODEBUG setting.\n * crypto/tls: The new ClientHelloInfo.HelloRetryRequest field\n indicates if the ClientHello was sent in response to a\n HelloRetryRequest message. The new\n ConnectionState.HelloRetryRequest field indicates if the server\n sent a HelloRetryRequest, or if the client received a\n HelloRetryRequest, depending on connection role.\n * crypto/tls: The QUICConn type used by QUIC implementations\n includes a new event for reporting TLS handshake errors.\n * crypto/tls: If Certificate.PrivateKey implements\n crypto.MessageSigner, its SignMessage method is used instead of\n Sign in TLS 1.2 and later.\n * crypto/tls: The following GODEBUG settings introduced in Go\n 1.22 and Go 1.23 will be removed in the next major Go\n release. Starting in Go 1.27, the new behavior will apply\n regardless of GODEBUG setting or go.mod language version.\n * crypto/tls: GODEBUG tlsunsafeekm:\n ConnectionState.ExportKeyingMaterial will require TLS 1.3 or\n Extended Master Secret.\n * crypto/tls: GODEBUG tlsrsakex: legacy RSA-only key exchanges\n without ECDH won't be enabled by default.\n * crypto/tls: GODEBUG tls10server: the default minimum TLS\n version for both clients and servers will be TLS 1.2.\n * crypto/tls: GODEBUG tls3des: the default cipher suites will not\n include 3DES.\n * crypto/tls: GODEBUG x509keypairleaf: X509KeyPair and\n LoadX509KeyPair will always populate the Certificate.Leaf\n field.\n * crypto/x509: The ExtKeyUsage and KeyUsage types now have String\n methods that return the corresponding OID names as defined in\n RFC 5280 and other registries.\n * crypto/x509: The ExtKeyUsage type now has an OID method that\n returns the corresponding OID for the EKU.\n * crypto/x509: The new OIDFromASN1OID function allows converting\n an encoding/asn1.ObjectIdentifier into an OID.\n * debug/elf: Additional R_LARCH_* constants from LoongArch ELF\n psABI v20250521 (global version v2.40) are defined for use with\n LoongArch systems.\n * errors: The new AsType function is a generic version of As. It\n is type-safe, faster, and, in most cases, easier to use.\n * fmt: For unformatted strings, fmt.Errorf('x') now allocates\n less and generally matches the allocations for errors.New('x').\n * go/ast: The new ParseDirective function parses directive\n comments, which are comments such as //go:generate. Source code\n tools can support their own directive comments and this new API\n should help them implement the conventional syntax.\n * go/ast: The new BasicLit.ValueEnd field records the precise end\n position of a literal so that the BasicLit.End method can now\n always return the correct answer. (Previously it was computed\n using a heuristic that was incorrect for multi-line raw string\n literals in Windows source files, due to removal of carriage\n returns.)\n * go/ast: Programs that update the ValuePos field of BasicLits\n produced by the parser may need to also update or clear the\n ValueEnd field to avoid minor differences in formatted output.\n * go/token: The new File.End convenience method returns the\n file's end position.\n * go/types: The gotypesalias GODEBUG setting introduced in Go\n 1.22 will be removed in the next major Go release. Starting in\n Go 1.27, the go/types package will always produce an Alias type\n for the representation of type aliases regardless of GODEBUG\n setting or go.mod language version.\n * image/jpeg: The JPEG encoder and decoder have been replaced\n with new, faster, more accurate implementations. Code that\n expects specific bit-for-bit outputs from the encoder or\n decoder may need to be updated.\n * io: ReadAll now allocates less intermediate memory and returns\n a minimally sized final slice. It is often about two times\n faster while typically allocating around half as much total\n memory, with more benefit for larger inputs.\n * log/slog: The NewMultiHandler function creates a MultiHandler\n that invokes all the given Handlers. Its Enabled method reports\n whether any of the handlers' Enabled methods return true. Its\n Handle, WithAttrs and WithGroup methods call the corresponding\n method on each of the enabled handlers.\n * net: The new Dialer methods DialIP, DialTCP, DialUDP, and\n DialUnix permit dialing specific network types with context\n values.\n * net/http: The new HTTP2Config.StrictMaxConcurrentRequests field\n controls whether a new connection should be opened if an\n existing HTTP/2 connection has exceeded its stream limit.\n * net/http: The new Transport.NewClientConn method returns a\n client connection to an HTTP server. Most users should continue\n to use Transport.RoundTrip to make requests, which manages a\n pool of connections. NewClientConn is useful for users who need\n to implement their own connection management.\n * net/http: Client now uses and sets cookies scoped to URLs with\n the host portion matching Request.Host when\n available. Previously, the connection address host was always\n used.\n * net/http/httptest: The HTTP client returned by Server.Client\n will now redirect requests for example.com and any subdomains\n to the server being tested.\n * net/http/httputil: The ReverseProxy.Director configuration\n field is deprecated in favor of ReverseProxy.Rewrite.\n * net/http/httputil: A malicious client can remove headers added\n by a Director function by designating those headers as\n hop-by-hop. Since there is no way to address this problem\n within the scope of the Director API, we added a new Rewrite\n hook in Go 1.20. Rewrite hooks are provided with both the\n unmodified inbound request received by the proxy and the\n outbound request which will be sent by the proxy. Since the\n Director hook is fundamentally unsafe, we are now deprecating\n it.\n * net/netip: The new Prefix.Compare method compares two prefixes.\n * net/url: Parse now rejects malformed URLs containing colons in\n the host subcomponent, such as http://::1/ or\n http://localhost:80:80/. URLs containing bracketed IPv6\n addresses, such as http://[::1]/ are still accepted. The new\n GODEBUG setting urlstrictcolons=0 restores the old behavior.\n * os: The new Process.WithHandle method provides access to an\n internal process handle on supported platforms (pidfd on Linux\n 5.4 or later, Handle on Windows).\n * os: On Windows, the OpenFile flag parameter can now contain any\n combination of Windows-specific file flags, such as\n FILE_FLAG_OVERLAPPED and FILE_FLAG_SEQUENTIAL_SCAN, for control\n of file or device caching behavior, access modes, and other\n special-purpose flags.\n * os/signal: NotifyContext now cancels the returned context with\n context.CancelCauseFunc and an error indicating which signal\n was received.\n * reflect: The new methods Type.Fields, Type.Methods, Type.Ins\n and Type.Outs return iterators for a type's fields (for a\n struct type), methods, inputs and outputs parameters (for a\n function type), respectively. Similarly, the new methods\n Value.Fields and Value.Methods return iterators over a value's\n fields or methods, respectively. Each iteration yields the type\n information (StructField or Method) of a field or method, along\n with the field or method Value.\n * runtime/metrics: Several new scheduler metrics have been added,\n including counts of goroutines in various states (waiting,\n runnable, etc.) under the /sched/goroutines prefix, the number\n of OS threads the runtime is aware of with\n /sched/threads:threads, and the total number of goroutines\n created by the program with\n /sched/goroutines-created:goroutines.\n * testing: The new methods T.ArtifactDir, B.ArtifactDir, and\n F.ArtifactDir return a directory in which to write test output\n files (artifacts).\n * testing: When the -artifacts flag is provided to go test, this\n directory will be located under the output directory (specified\n with -outputdir, or the current directory by\n default). Otherwise, artifacts are stored in a temporary\n directory which is removed after the test completes.\n * testing: The first call to ArtifactDir when -artifacts is\n provided writes the location of the directory to the test log.\n * testing: The B.Loop method no longer prevents inlining in the\n loop body, which could lead to unanticipated allocation and\n slower benchmarks. With this fix, we expect that all benchmarks\n can be converted from the old B.N style to the new B.Loop style\n with no ill effects. Within the body of a for b.Loop() { ... }\n loop, function call parameters, results, and assigned variables\n are still kept alive, preventing the compiler from optimizing\n away entire parts of the benchmark.\n * testing/cryptotest: The new SetGlobalRandom function configures\n a global, deterministic cryptographic randomness source for the\n duration of the test. It affects crypto/rand, and all implicit\n sources of cryptographic randomness in the crypto/... packages.\n * time: The asynctimerchan GODEBUG setting introduced in Go 1.23\n will be removed in the next major Go release. Starting in Go\n 1.27, the time package will always use unbuffered (synchronous)\n channels for timers regardless of GODEBUG setting or go.mod\n language version.\n * Ports: Darwin: Go 1.26 is the last release that will run on\n macOS 12 Monterey. Go 1.27 will require macOS 13 Ventura or\n later.\n * Ports: FreeBSD: The freebsd/riscv64 port (GOOS=freebsd\n GOARCH=riscv64) has been marked broken. See issue 76475 for\n details.\n * Ports: Windows: As announced in the Go 1.25 release notes, the\n broken 32-bit windows/arm port (GOOS=windows GOARCH=arm) has\n been removed.\n * Ports: PowerPC: Go 1.26 is the last release that supports the\n ELFv1 ABI on the big-endian 64-bit PowerPC port on Linux\n (GOOS=linux GOARCH=ppc64). It will switch to the ELFv2 ABI in\n Go 1.27. As the port does not currently support linking against\n other ELF objects, we expect this change to be transparent to\n users.\n * Ports: RISC-V: The linux/riscv64 port now supports the race\n detector.\n * Ports: S390X: The s390x port now supports passing function\n arguments and results using registers.\n * Ports: WebAssembly: The compiler now unconditionally makes use\n of the sign extension and non-trapping floating-point to\n integer conversion instructions. These features have been\n standardized since at least Wasm 2.0. The corresponding GOWASM\n settings, signext and satconv, are now ignored.\n * Ports: WebAssembly: For WebAssembly applications, the runtime\n now manages chunks of heap memory in much smaller increments,\n leading to significantly reduced memory usage for applications\n with heaps less than around 16 MiB in size.\n- go1.26rc3 (released 2026-02-04) is a release candidate version of\n go1.26 cut from the master branch at the revision tagged\n go1.26rc3.\n- go1.26rc2 (released 2026-01-15) is a release candidate version of\n go1.26rc2.\n * go1.26 requires go1.24.6 or later for bootstrap.\n- go1.26rc1 (released 2025-12-16) is a release candidate version of\n go1.26rc1.\n",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/SUSE%2FSUSE-SU-2026:0976-1.json?alt=media"
                },
                {
                    "category": "other",
                    "text": "0.00041",
                    "title": "EPSS"
                },
                {
                    "category": "other",
                    "text": "4.2",
                    "title": "NCSC Score"
                },
                {
                    "category": "other",
                    "text": "VENDOR FIX as product remediation category",
                    "title": "NCSC Score top increasing factors"
                },
                {
                    "category": "other",
                    "text": "The value of the most recent CVSS (V3) score, Is related to (a version of) product Amazon Linux",
                    "title": "NCSC Score top decreasing factors"
                },
                {
                    "category": "details",
                    "text": "Severity: 1\n",
                    "title": "Vendor assessment"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-5734988",
                    "CSAFPID-5734989",
                    "CSAFPID-5770310",
                    "CSAFPID-1317176",
                    "CSAFPID-5774487",
                    "CSAFPID-1439317",
                    "CSAFPID-1439319",
                    "CSAFPID-1439328",
                    "CSAFPID-1441162",
                    "CSAFPID-1488100",
                    "CSAFPID-1919975",
                    "CSAFPID-1919988",
                    "CSAFPID-1919995",
                    "CSAFPID-1920009",
                    "CSAFPID-1920015",
                    "CSAFPID-2858634",
                    "CSAFPID-2914837",
                    "CSAFPID-2942231",
                    "CSAFPID-5198605",
                    "CSAFPID-5593234",
                    "CSAFPID-5593257",
                    "CSAFPID-1317174",
                    "CSAFPID-5826711",
                    "CSAFPID-5826712",
                    "CSAFPID-1330296",
                    "CSAFPID-1317175",
                    "CSAFPID-5908690",
                    "CSAFPID-5908691",
                    "CSAFPID-5908692",
                    "CSAFPID-5908693",
                    "CSAFPID-1317177"
                ],
                "known_not_affected": [
                    "CSAFPID-1396505",
                    "CSAFPID-1396506"
                ]
            },
            "references": [
                {
                    "category": "external",
                    "summary": "Source - certbundde",
                    "url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0548.json"
                },
                {
                    "category": "external",
                    "summary": "Source - nvd",
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
                },
                {
                    "category": "external",
                    "summary": "Source raw - nvd",
                    "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2026-27138"
                },
                {
                    "category": "external",
                    "summary": "Source - cveprojectv5",
                    "url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
                },
                {
                    "category": "external",
                    "summary": "Source raw - cveprojectv5",
                    "url": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2026/27xxx/CVE-2026-27138.json"
                },
                {
                    "category": "external",
                    "summary": "Source - debian",
                    "url": "https://security-tracker.debian.org/tracker/CVE-2026-27138"
                },
                {
                    "category": "external",
                    "summary": "Source - first",
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27138"
                },
                {
                    "category": "external",
                    "summary": "Source raw - first",
                    "url": "https://api.first.org/data/v1/epss?limit=10000&offset=0"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGO-2026-4600.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Bitnami%2FBIT-golang-2026-27138.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Source - microsoft",
                    "url": "https://api.msrc.microsoft.com/cvrf/v3.0/cvrf/2026-Mar"
                },
                {
                    "category": "external",
                    "summary": "Source - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2026-27138"
                },
                {
                    "category": "external",
                    "summary": "Source raw - redhat",
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27138.json"
                },
                {
                    "category": "external",
                    "summary": "Source - first",
                    "url": "https://api.first.org/data/v1/epss?limit=10000&offset=0"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/SUSE%2FSUSE-SU-2026:0976-1.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; nvd; osv; redhat",
                    "url": "https://go.dev/cl/752183"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; nvd; osv; redhat",
                    "url": "https://go.dev/issue/77953"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0548.json"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0548"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://groups.google.com/g/golang-announce/c/qbkuaO2xasI/m/hmaB1OGBBQAJ?pli=1"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; nvd; osv; redhat",
                    "url": "https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; nvd; osv; redhat",
                    "url": "https://pkg.go.dev/vuln/GO-2026-4600"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B2IXB7BTZPU5M6YJC45KXVXGXWNVXGGJ/"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv; redhat",
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27138"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024674.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024673.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3203.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3202.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024783.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://access.redhat.com/errata/RHSA-2026:5192"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://access.redhat.com/errata/RHSA-2026:5549"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024821.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024820.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024870.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260976-1/"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1255111"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1259264"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1259265"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1259266"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1259267"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://bugzilla.suse.com/1259268"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-25679"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-27137"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-27138"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-27139"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://www.suse.com/security/cve/CVE-2026-27142"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "http://linux.oracle.com/errata/ELSA-2026-5942.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://linux.oracle.com/errata/ELSA-2026-5941.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://linux.oracle.com/errata/ELSA-2026-5942.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://access.redhat.com/errata/RHSA-2026:5941"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://access.redhat.com/errata/RHSA-2026:5942"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://access.redhat.com/errata/RHSA-2026:5944"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://access.redhat.com/errata/RHSA-2026:6341"
                }
            ],
            "remediations": [
                {
                    "category": "mitigation",
                    "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
                    "product_ids": [
                        "CSAFPID-1439317",
                        "CSAFPID-1439319",
                        "CSAFPID-1439328",
                        "CSAFPID-1441162",
                        "CSAFPID-1488100",
                        "CSAFPID-1919975",
                        "CSAFPID-1919988",
                        "CSAFPID-1919995",
                        "CSAFPID-1920009",
                        "CSAFPID-1920015",
                        "CSAFPID-2858634",
                        "CSAFPID-2914837",
                        "CSAFPID-2942231",
                        "CSAFPID-5198605",
                        "CSAFPID-5593234",
                        "CSAFPID-5593257"
                    ]
                },
                {
                    "category": "vendor_fix",
                    "details": "CBL-Mariner Releases",
                    "product_ids": [
                        "CSAFPID-5826711",
                        "CSAFPID-5826712"
                    ]
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 5.9,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1317174",
                        "CSAFPID-1317175",
                        "CSAFPID-1317176",
                        "CSAFPID-1317177",
                        "CSAFPID-1330296",
                        "CSAFPID-1439317",
                        "CSAFPID-1439319",
                        "CSAFPID-1439328",
                        "CSAFPID-1441162",
                        "CSAFPID-1488100",
                        "CSAFPID-1919975",
                        "CSAFPID-1919988",
                        "CSAFPID-1919995",
                        "CSAFPID-1920009",
                        "CSAFPID-1920015",
                        "CSAFPID-2858634",
                        "CSAFPID-2914837",
                        "CSAFPID-2942231",
                        "CSAFPID-5198605",
                        "CSAFPID-5593234",
                        "CSAFPID-5593257",
                        "CSAFPID-5734988",
                        "CSAFPID-5734989",
                        "CSAFPID-5770310",
                        "CSAFPID-5774487",
                        "CSAFPID-5826711",
                        "CSAFPID-5826712",
                        "CSAFPID-5908690",
                        "CSAFPID-5908691",
                        "CSAFPID-5908692",
                        "CSAFPID-5908693"
                    ]
                }
            ],
            "title": "CVE-2026-27138"
        }
    ]
}