Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat mirror Registry For Red Hat Openshift
|
|
| CPEs | cpe:2.3:a:redhat:mirror_registry_for_red_hat_openshift:-:*:*:*:*:*:*:* cpe:2.3:a:redhat:mirror_registry_for_red_hat_openshift:2.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Redhat mirror Registry For Red Hat Openshift
|
Thu, 09 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediate data in the database using a format that, if tampered with, could allow an attacker to execute arbitrary code on the Quay server. | |
| Title | Mirror-registry: remote code execution using pickle deserialization | |
| First Time appeared |
Redhat
Redhat mirror Registry Redhat quay |
|
| Weaknesses | CWE-502 | |
| CPEs | cpe:/a:redhat:mirror_registry:1 cpe:/a:redhat:mirror_registry:2 cpe:/a:redhat:quay:3 |
|
| Vendors & Products |
Redhat
Redhat mirror Registry Redhat quay |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-21T23:33:34.858Z
Reserved: 2026-03-12T14:39:53.657Z
Link: CVE-2026-32590
Updated: 2026-04-08T19:14:52.191Z
Status : Analyzed
Published: 2026-04-08T18:25:59.947
Modified: 2026-04-21T23:20:52.477
Link: CVE-2026-32590
OpenCVE Enrichment
Updated: 2026-04-09T08:18:40Z