DirectorySecurity AdvisoriesPricing
Sign in
Security Advisories

CGA-24mw-v6jc-82wj

Package

harbor-fips-2.15

Component

github.com/jackc/pgproto3/v2

Latest update
Pending upstream fix
Aliases
  • CVE-2026-32286
  • GHSA-jqcq-xjh3-6g23
  • GO-2026-4518

Severity

Unknown
Eliminate CVEs with Chainguard hardened images

Build, ship, and run secure software with minimal, hardened container images — rebuilt from source daily and guarded under our industry-leading remediation SLA.

Start for free

References

  • https://nvd.nist.gov/vuln/detail/CVE-2026-32286

Updates

Status

Pending upstream fix

Impact

The vulnerable component is github.com/jackc/pgproto3/v2. Per the GitHub Security Advisory at https://github.com/advisories/GHSA-jqcq-xjh3-6g23 (Denial of service in github.com/jackc/pgproto3/v2), github.com/jackc/pgproto3/v2 is listed as affected with no published fixed version (vulnerable range >=2.0.0,<=2.3.3). The advisory tracks the v2 module path only and declares no firstPatchedVersion; the v2 branch is not receiving the fix. Without an upstream patched release of github.com/jackc/pgproto3/v2, this issue cannot be closed by routine dependency-bump automation. A pending-upstream-fix advisory event is justified: the issue should reflect that we are awaiting either an upstream v2 fix, or a package-level migration to a successor module path.

Status

Affected

Impact

Govulncheck found vulnerable symbols in Go binary at usr/bin/harbor-core.

Status

Under investigation


The trusted source for open source

Talk to an expert
PrivacyTerms

Product

Chainguard ContainersChainguard LibrariesChainguard VMsChainguard OS PackagesChainguard ActionsChainguard Agent SkillsIntegrationsPricing
© 2026 Chainguard, Inc. All Rights Reserved.
Chainguard® and the Chainguard logo are registered trademarks of Chainguard, Inc. in the United States and/or other countries.
The other respective trademarks mentioned on this page are owned by the respective companies and use of them does not imply any affiliation or endorsement.