SUSE Rancher - RKE2 v1.34.3 version - CVE Scans - 2026-02-09

How to use this page

Search:

Image Mirrored Release Binary/Package Dependency Vulnerability ID (CVE) Severity Status Justification (for status not affected) Type (language or OS)
rancher/hardened-addon-resizer:1.8.23-build20251204 false RKE2 v1.34.3 pod_nanny stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-addon-resizer:1.8.23-build20251204 false RKE2 v1.34.3 pod_nanny stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-addon-resizer:1.8.23-build20251204 false RKE2 v1.34.3 pod_nanny stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 glibc glibc@2.38-150600.14.37.1 SUSE-SU-2026:0371-1 HIGH affected sles
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 calicoctl stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 calicoctl stdlib@v1.24.11 CVE-2025-61728
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 calicoctl stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 calicoctl stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/bandwidth stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/bandwidth stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/bond stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/bridge stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/bridge stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/calico stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/calico stdlib@v1.24.11 CVE-2025-61728
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/calico stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/calico stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/calico-ipam stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/calico-ipam stdlib@v1.24.11 CVE-2025-61728
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/calico-ipam stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/calico-ipam stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/dhcp stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/dhcp stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/dummy stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/dummy stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/firewall stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/firewall stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/flannel stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/host-device stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/host-device stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/host-local stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/host-local stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/install stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/install stdlib@v1.24.11 CVE-2025-61728
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/install stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/install stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/ipvlan stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/ipvlan stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/loopback stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/loopback stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/macvlan stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/macvlan stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/portmap stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/portmap stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/ptp stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/ptp stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/sbr stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/sbr stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/static stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/static stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/tap stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/tap stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/tuning stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/tuning stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/vlan stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/vlan stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/vrf stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/vrf stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/calico-node stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/calico-node stdlib@v1.24.11 CVE-2025-61728
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/calico-node stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/calico-node stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/check-status stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/check-status stdlib@v1.24.11 CVE-2025-61728
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/check-status stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/check-status stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/kube-controllers stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/kube-controllers stdlib@v1.24.11 CVE-2025-61728
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/kube-controllers stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/kube-controllers stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/local/bin/flexvol/flexvoldriver stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/local/bin/flexvol/flexvoldriver stdlib@v1.24.11 CVE-2025-61728
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/local/bin/flexvol/flexvoldriver stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/local/bin/flexvol/flexvoldriver stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-cluster-autoscaler:v1.10.2-build20251204 false RKE2 v1.34.3 cluster-proportional-autoscaler stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-cluster-autoscaler:v1.10.2-build20251204 false RKE2 v1.34.3 cluster-proportional-autoscaler stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-coredns:v1.13.1-build20251204 false RKE2 v1.34.3 busybox busybox@1.37.0-150700.18.7.1 SUSE-SU-2026:0235-1 HIGH affected sles
rancher/hardened-coredns:v1.13.1-build20251204 false RKE2 v1.34.3 glibc glibc@2.38-150600.14.37.1 SUSE-SU-2026:0371-1 HIGH affected sles
rancher/hardened-coredns:v1.13.1-build20251204 false RKE2 v1.34.3 coredns github.com/coredns/coredns@v1.13.1 CVE-2025-68151
HIGH*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-coredns:v1.13.1-build20251204 false RKE2 v1.34.3 coredns github.com/expr-lang/expr@v1.17.6 CVE-2025-68156 HIGH affected gobinary
rancher/hardened-coredns:v1.13.1-build20251204 false RKE2 v1.34.3 coredns stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-coredns:v1.13.1-build20251204 false RKE2 v1.34.3 coredns stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-coredns:v1.13.1-build20251204 false RKE2 v1.34.3 coredns stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-dns-node-cache:1.26.7-build20251204 false RKE2 v1.34.3 busybox busybox@1.37.0-150700.18.7.1 SUSE-SU-2026:0235-1 HIGH affected sles
rancher/hardened-dns-node-cache:1.26.7-build20251204 false RKE2 v1.34.3 glibc glibc@2.38-150600.14.37.1 SUSE-SU-2026:0371-1 HIGH affected sles
rancher/hardened-dns-node-cache:1.26.7-build20251204 false RKE2 v1.34.3 node-cache github.com/coredns/coredns@v1.13.1 CVE-2025-68151
HIGH*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-dns-node-cache:1.26.7-build20251204 false RKE2 v1.34.3 node-cache stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-dns-node-cache:1.26.7-build20251204 false RKE2 v1.34.3 node-cache stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-dns-node-cache:1.26.7-build20251204 false RKE2 v1.34.3 node-cache stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-etcd:v3.6.6-k3s1-build20251210 false RKE2 v1.34.3 usr/local/bin/etcd stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-etcd:v3.6.6-k3s1-build20251210 false RKE2 v1.34.3 usr/local/bin/etcd stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-etcd:v3.6.6-k3s1-build20251210 false RKE2 v1.34.3 usr/local/bin/etcd stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-etcd:v3.6.6-k3s1-build20251210 false RKE2 v1.34.3 usr/local/bin/etcdctl stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-etcd:v3.6.6-k3s1-build20251210 false RKE2 v1.34.3 usr/local/bin/etcdctl stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-flannel:v0.27.4-build20251204 false RKE2 v1.34.3 busybox busybox@1.37.0-150700.18.7.1 SUSE-SU-2026:0235-1 HIGH affected sles
rancher/hardened-flannel:v0.27.4-build20251204 false RKE2 v1.34.3 glibc glibc@2.38-150600.14.37.1 SUSE-SU-2026:0371-1 HIGH affected sles
rancher/hardened-flannel:v0.27.4-build20251204 false RKE2 v1.34.3 opt/bin/flanneld stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-flannel:v0.27.4-build20251204 false RKE2 v1.34.3 opt/bin/flanneld stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-flannel:v0.27.4-build20251204 false RKE2 v1.34.3 opt/bin/flanneld stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-k8s-metrics-server:v0.8.0-build20251204 false RKE2 v1.34.3 metrics-server stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-k8s-metrics-server:v0.8.0-build20251204 false RKE2 v1.34.3 metrics-server stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-k8s-metrics-server:v0.8.0-build20251204 false RKE2 v1.34.3 metrics-server stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 glibc glibc@2.38-150600.14.37.1 SUSE-SU-2026:0371-1 HIGH affected sles
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 gpg2 gpg2@2.4.4-150600.3.9.1 SUSE-SU-2026:0215-1 HIGH affected sles
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 libglib-2_0-0 libglib-2_0-0@2.78.6-150600.4.22.1 SUSE-SU-2026:0018-1 HIGH affected sles
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 libglib-2_0-0 libglib-2_0-0@2.78.6-150600.4.22.1 SUSE-SU-2026:0373-1 HIGH affected sles
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-apiserver stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-apiserver stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-apiserver stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-controller-manager stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-controller-manager stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-controller-manager stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-proxy stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-proxy stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-proxy stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-scheduler stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-scheduler stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-scheduler stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kubectl stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kubectl stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kubectl stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kubelet stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kubelet stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kubelet stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 libcrypto3 libcrypto3@3.5.4-r0 CVE-2025-69419 HIGH affected alpine
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 libcrypto3 libcrypto3@3.5.4-r0 CVE-2025-69421 HIGH affected alpine
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 libssl3 libssl3@3.5.4-r0 CVE-2025-69421 HIGH affected alpine
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status stdlib@v1.24.11 CVE-2025-61728
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 usr/bin/helm stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 usr/bin/helm stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 usr/bin/helm stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/klipper-lb:v0.4.13 false RKE2 v1.34.3 libcrypto3 libcrypto3@3.3.3-r0 CVE-2025-69419 HIGH affected alpine
rancher/klipper-lb:v0.4.13 false RKE2 v1.34.3 libcrypto3 libcrypto3@3.3.3-r0 CVE-2025-69421 HIGH affected alpine
rancher/klipper-lb:v0.4.13 false RKE2 v1.34.3 libssl3 libssl3@3.3.3-r0 CVE-2025-69421 HIGH affected alpine
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.5 true RKE2 v1.34.3 kube-webhook-certgen stdlib@v1.25.4 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.5 true RKE2 v1.34.3 kube-webhook-certgen stdlib@v1.25.4 CVE-2025-61728
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.5 true RKE2 v1.34.3 kube-webhook-certgen stdlib@v1.25.4 CVE-2025-61729 HIGH affected gobinary
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.5 true RKE2 v1.34.3 kube-webhook-certgen stdlib@v1.25.4 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.5 true RKE2 v1.34.3 kube-webhook-certgen stdlib@v1.25.4 CVE-2025-68121 HIGH affected gobinary
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.5 true RKE2 v1.34.3 kube-webhook-certgen stdlib@v1.25.4 CVE-2025-61727
HIGH*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller stdlib@v1.23.1 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller stdlib@v1.23.1 CVE-2025-61729 HIGH affected gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller stdlib@v1.23.1 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller stdlib@v1.23.1 CVE-2025-68121 HIGH affected gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller stdlib@v1.23.1 CVE-2025-47912
HIGH*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller stdlib@v1.23.1 CVE-2025-58188
HIGH*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller stdlib@v1.23.1 CVE-2025-61727
HIGH*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 glib2-tools glib2-tools@2.78.6-150600.4.22.1 SUSE-SU-2026:0018-1 HIGH affected sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 glib2-tools glib2-tools@2.78.6-150600.4.22.1 SUSE-SU-2026:0373-1 HIGH affected sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 glibc glibc@2.38-150600.14.37.1 SUSE-SU-2026:0371-1 HIGH affected sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 glibc-devel glibc-devel@2.38-150600.14.37.1 SUSE-SU-2026:0371-1 HIGH affected sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 gpg2 gpg2@2.4.4-150600.3.9.1 SUSE-SU-2026:0215-1 HIGH affected sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 libgio-2_0-0 libgio-2_0-0@2.78.6-150600.4.22.1 SUSE-SU-2026:0018-1 HIGH affected sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 libgio-2_0-0 libgio-2_0-0@2.78.6-150600.4.22.1 SUSE-SU-2026:0373-1 HIGH affected sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 libglib-2_0-0 libglib-2_0-0@2.78.6-150600.4.22.1 SUSE-SU-2026:0018-1 HIGH affected sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 libglib-2_0-0 libglib-2_0-0@2.78.6-150600.4.22.1 SUSE-SU-2026:0373-1 HIGH affected sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 libgmodule-2_0-0 libgmodule-2_0-0@2.78.6-150600.4.22.1 SUSE-SU-2026:0018-1 HIGH affected sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 libgmodule-2_0-0 libgmodule-2_0-0@2.78.6-150600.4.22.1 SUSE-SU-2026:0373-1 HIGH affected sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 libgobject-2_0-0 libgobject-2_0-0@2.78.6-150600.4.22.1 SUSE-SU-2026:0018-1 HIGH affected sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 libgobject-2_0-0 libgobject-2_0-0@2.78.6-150600.4.22.1 SUSE-SU-2026:0373-1 HIGH affected sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 dbg stdlib@v1.25.5 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 dbg stdlib@v1.25.5 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 dbg stdlib@v1.25.5 CVE-2025-68121 HIGH affected gobinary
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 nginx-ingress-controller stdlib@v1.25.5 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 nginx-ingress-controller stdlib@v1.25.5 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 nginx-ingress-controller stdlib@v1.25.5 CVE-2025-68121 HIGH affected gobinary
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 wait-shutdown stdlib@v1.25.5 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 wait-shutdown stdlib@v1.25.5 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 wait-shutdown stdlib@v1.25.5 CVE-2025-68121 HIGH affected gobinary
rancher/rke2-cloud-provider:v1.34.3-0.20251210094406-1ff6ebef7028-build20251210 false RKE2 v1.34.3 usr/local/bin/rke2-cloud-provider github.com/expr-lang/expr@v1.17.6 CVE-2025-68156 HIGH affected gobinary
rancher/rke2-cloud-provider:v1.34.3-0.20251210094406-1ff6ebef7028-build20251210 false RKE2 v1.34.3 usr/local/bin/rke2-cloud-provider stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-cloud-provider:v1.34.3-0.20251210094406-1ff6ebef7028-build20251210 false RKE2 v1.34.3 usr/local/bin/rke2-cloud-provider stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-cloud-provider:v1.34.3-0.20251210094406-1ff6ebef7028-build20251210 false RKE2 v1.34.3 usr/local/bin/rke2-cloud-provider stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd stdlib@v1.24.9 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd stdlib@v1.24.9 CVE-2025-61729 HIGH affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd stdlib@v1.24.9 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd stdlib@v1.24.9 CVE-2025-68121 HIGH affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd stdlib@v1.24.9 CVE-2025-61727
HIGH*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd-shim-runc-v2 stdlib@v1.24.9 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd-shim-runc-v2 stdlib@v1.24.9 CVE-2025-61729 HIGH affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd-shim-runc-v2 stdlib@v1.24.9 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd-shim-runc-v2 stdlib@v1.24.9 CVE-2025-68121 HIGH affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd-shim-runc-v2 stdlib@v1.24.9 CVE-2025-61727
HIGH*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/crictl stdlib@v1.25.5 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/crictl stdlib@v1.25.5 CVE-2025-68121 HIGH affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/ctr stdlib@v1.24.9 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/ctr stdlib@v1.24.9 CVE-2025-61729 HIGH affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/ctr stdlib@v1.24.9 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/ctr stdlib@v1.24.9 CVE-2025-68121 HIGH affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/ctr stdlib@v1.24.9 CVE-2025-61727
HIGH*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/kubectl stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/kubectl stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/kubectl stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/kubelet stdlib@v1.24.11 CVE-2025-61726
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/kubelet stdlib@v1.24.11 CVE-2025-61730
LOW*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/kubelet stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/runc stdlib@v1.24.11 CVE-2025-68121 HIGH affected gobinary
rancher/hardened-addon-resizer:1.8.23-build20251204 false RKE2 v1.34.3 pod_nanny golang.org/x/net@v0.33.0 CVE-2025-22870 none not affected vulnerable code not present gobinary
rancher/hardened-addon-resizer:1.8.23-build20251204 false RKE2 v1.34.3 pod_nanny golang.org/x/net@v0.33.0 CVE-2025-22872 none not affected vulnerable code not present gobinary
rancher/hardened-addon-resizer:1.8.23-build20251204 false RKE2 v1.34.3 pod_nanny golang.org/x/oauth2@v0.24.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/hardened-addon-resizer:1.8.23-build20251204 false RKE2 v1.34.3 pod_nanny stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 libopenssl-3-fips-provider libopenssl-3-fips-provider@3.2.3-150700.5.21.1 SUSE-SU-2026:0309-1 none not affected vulnerable code not in execute path sles
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 libopenssl3 libopenssl3@3.2.3-150700.5.21.1 SUSE-SU-2026:0309-1 none not affected vulnerable code not in execute path sles
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 calicoctl golang.org/x/crypto@v0.43.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 calicoctl golang.org/x/crypto@v0.43.0 CVE-2025-58181 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/bandwidth stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/bandwidth stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/bond stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/bond stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/bond stdlib@v1.24.11 CVE-2025-61730 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/bridge stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/bridge stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/calico golang.org/x/crypto@v0.43.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/calico golang.org/x/crypto@v0.43.0 CVE-2025-58181 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/calico-ipam golang.org/x/crypto@v0.43.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/calico-ipam golang.org/x/crypto@v0.43.0 CVE-2025-58181 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/dhcp stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/dhcp stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/dummy stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/dummy stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/firewall stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/firewall stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/flannel stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/flannel stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/flannel stdlib@v1.24.11 CVE-2025-61730 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/host-device stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/host-device stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/host-local stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/host-local stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/ipvlan stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/ipvlan stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/loopback stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/loopback stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/macvlan stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/macvlan stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/portmap stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/portmap stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/ptp stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/ptp stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/sbr stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/sbr stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/static stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/static stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/tap github.com/opencontainers/selinux@v1.12.0 CVE-2025-52881 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/tap stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/tap stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/tuning stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/tuning stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/vlan stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/vlan stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/vrf stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 opt/cni/bin/vrf stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/calico-node golang.org/x/crypto@v0.43.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/calico-node golang.org/x/crypto@v0.43.0 CVE-2025-58181 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/kube-controllers golang.org/x/crypto@v0.43.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.31.2-build20251205 false RKE2 v1.34.3 usr/bin/kube-controllers golang.org/x/crypto@v0.43.0 CVE-2025-58181 none not affected vulnerable code not present gobinary
rancher/hardened-cluster-autoscaler:v1.10.2-build20251204 false RKE2 v1.34.3 cluster-proportional-autoscaler golang.org/x/net@v0.36.0 CVE-2025-22872 none not affected vulnerable code not present gobinary
rancher/hardened-cluster-autoscaler:v1.10.2-build20251204 false RKE2 v1.34.3 cluster-proportional-autoscaler golang.org/x/oauth2@v0.23.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/hardened-cluster-autoscaler:v1.10.2-build20251204 false RKE2 v1.34.3 cluster-proportional-autoscaler stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-cluster-autoscaler:v1.10.2-build20251204 false RKE2 v1.34.3 cluster-proportional-autoscaler stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-coredns:v1.13.1-build20251204 false RKE2 v1.34.3 coredns github.com/quic-go/quic-go@v0.55.0 CVE-2025-64702 none not affected vulnerable code not present gobinary
rancher/hardened-coredns:v1.13.1-build20251204 false RKE2 v1.34.3 coredns golang.org/x/crypto@v0.42.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-coredns:v1.13.1-build20251204 false RKE2 v1.34.3 coredns golang.org/x/crypto@v0.42.0 CVE-2025-58181 none not affected vulnerable code not present gobinary
rancher/hardened-coredns:v1.13.1-build20251204 false RKE2 v1.34.3 coredns stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not in execute path gobinary
rancher/hardened-dns-node-cache:1.26.7-build20251204 false RKE2 v1.34.3 node-cache github.com/quic-go/quic-go@v0.55.0 CVE-2025-64702 none not affected vulnerable code not present gobinary
rancher/hardened-dns-node-cache:1.26.7-build20251204 false RKE2 v1.34.3 node-cache golang.org/x/crypto@v0.43.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-dns-node-cache:1.26.7-build20251204 false RKE2 v1.34.3 node-cache golang.org/x/crypto@v0.43.0 CVE-2025-58181 none not affected vulnerable code not present gobinary
rancher/hardened-dns-node-cache:1.26.7-build20251204 false RKE2 v1.34.3 node-cache stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not in execute path gobinary
rancher/hardened-etcd:v3.6.6-k3s1-build20251210 false RKE2 v1.34.3 usr/local/bin/etcd golang.org/x/crypto@v0.36.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-etcd:v3.6.6-k3s1-build20251210 false RKE2 v1.34.3 usr/local/bin/etcd golang.org/x/crypto@v0.36.0 CVE-2025-58181 none not affected vulnerable code not present gobinary
rancher/hardened-etcd:v3.6.6-k3s1-build20251210 false RKE2 v1.34.3 usr/local/bin/etcd stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-etcd:v3.6.6-k3s1-build20251210 false RKE2 v1.34.3 usr/local/bin/etcdctl stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/hardened-etcd:v3.6.6-k3s1-build20251210 false RKE2 v1.34.3 usr/local/bin/etcdctl stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-flannel:v0.27.4-build20251204 false RKE2 v1.34.3 opt/bin/flanneld golang.org/x/crypto@v0.36.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-flannel:v0.27.4-build20251204 false RKE2 v1.34.3 opt/bin/flanneld golang.org/x/crypto@v0.36.0 CVE-2025-58181 none not affected vulnerable code not present gobinary
rancher/hardened-flannel:v0.27.4-build20251204 false RKE2 v1.34.3 opt/bin/flanneld stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-k8s-metrics-server:v0.8.0-build20251204 false RKE2 v1.34.3 metrics-server golang.org/x/crypto@v0.38.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-k8s-metrics-server:v0.8.0-build20251204 false RKE2 v1.34.3 metrics-server golang.org/x/crypto@v0.38.0 CVE-2025-58181 none not affected vulnerable code not present gobinary
rancher/hardened-k8s-metrics-server:v0.8.0-build20251204 false RKE2 v1.34.3 metrics-server stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 libopenssl-3-fips-provider libopenssl-3-fips-provider@3.2.3-150700.5.21.1 SUSE-SU-2026:0309-1 none not affected vulnerable code not in execute path sles
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 libopenssl3 libopenssl3@3.2.3-150700.5.21.1 SUSE-SU-2026:0309-1 none not affected vulnerable code not in execute path sles
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 openssl-3 openssl-3@3.2.3-150700.5.21.1 SUSE-SU-2026:0309-1 none not affected vulnerable code not in execute path sles
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-apiserver github.com/opencontainers/selinux@v1.11.1 CVE-2025-52881 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-apiserver golang.org/x/crypto@v0.36.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-apiserver golang.org/x/crypto@v0.36.0 CVE-2025-58181 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-apiserver stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-controller-manager github.com/opencontainers/selinux@v1.11.1 CVE-2025-52881 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-controller-manager golang.org/x/crypto@v0.36.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-controller-manager golang.org/x/crypto@v0.36.0 CVE-2025-58181 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-controller-manager stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-proxy golang.org/x/crypto@v0.36.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-proxy golang.org/x/crypto@v0.36.0 CVE-2025-58181 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-proxy stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-scheduler golang.org/x/crypto@v0.36.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-scheduler golang.org/x/crypto@v0.36.0 CVE-2025-58181 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kube-scheduler stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kubectl stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kubelet github.com/opencontainers/selinux@v1.11.1 CVE-2025-52881 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kubelet golang.org/x/crypto@v0.36.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kubelet golang.org/x/crypto@v0.36.0 CVE-2025-58181 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 false RKE2 v1.34.3 usr/local/bin/kubelet stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not in execute path gobinary
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 libcrypto3 libcrypto3@3.5.4-r0 CVE-2025-15467 none not affected vulnerable code not in execute path alpine
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 libssl3 libssl3@3.5.4-r0 CVE-2025-15467 none not affected vulnerable code not in execute path alpine
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 libssl3 libssl3@3.5.4-r0 CVE-2025-69419 none not affected vulnerable code not in execute path alpine
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not in execute path gobinary
rancher/klipper-helm:v0.9.12-build20251215 false RKE2 v1.34.3 usr/bin/helm stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not in execute path gobinary
rancher/klipper-lb:v0.4.13 false RKE2 v1.34.3 libcrypto3 libcrypto3@3.3.3-r0 CVE-2025-15467 none not affected vulnerable code not in execute path alpine
rancher/klipper-lb:v0.4.13 false RKE2 v1.34.3 libssl3 libssl3@3.3.3-r0 CVE-2025-15467 none not affected vulnerable code not in execute path alpine
rancher/klipper-lb:v0.4.13 false RKE2 v1.34.3 libssl3 libssl3@3.3.3-r0 CVE-2025-69419 none not affected vulnerable code not in execute path alpine
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller golang.org/x/net@v0.31.0 CVE-2025-22870 none not affected vulnerable code not present gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller golang.org/x/net@v0.31.0 CVE-2025-22872 none not affected vulnerable code not present gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller golang.org/x/oauth2@v0.24.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller stdlib@v1.23.1 CVE-2025-47907 none not affected vulnerable code not in execute path gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller stdlib@v1.23.1 CVE-2025-58183 none not affected vulnerable code not present gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller stdlib@v1.23.1 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.34.3 snapshot-controller stdlib@v1.23.1 CVE-2025-61725 none not affected vulnerable code not present gobinary
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 libopenssl-3-devel libopenssl-3-devel@3.2.3-150700.5.21.1 SUSE-SU-2026:0309-1 none not affected vulnerable code not in execute path sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 libopenssl-3-fips-provider libopenssl-3-fips-provider@3.2.3-150700.5.21.1 SUSE-SU-2026:0309-1 none not affected vulnerable code not in execute path sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 libopenssl3 libopenssl3@3.2.3-150700.5.21.1 SUSE-SU-2026:0309-1 none not affected vulnerable code not in execute path sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 openssl-3 openssl-3@3.2.3-150700.5.21.1 SUSE-SU-2026:0309-1 none not affected vulnerable code not in execute path sles
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 dbg stdlib@v1.25.5 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 nginx-ingress-controller stdlib@v1.25.5 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/nginx-ingress-controller:v1.13.5-hardened2 false RKE2 v1.34.3 wait-shutdown stdlib@v1.25.5 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/rke2-cloud-provider:v1.34.3-0.20251210094406-1ff6ebef7028-build20251210 false RKE2 v1.34.3 usr/local/bin/rke2-cloud-provider stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd github.com/containerd/containerd/v2@v2.1.5-k3s1 CVE-2024-25621 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd github.com/opencontainers/selinux@v1.12.0 CVE-2025-52881 none not affected vulnerable code not in execute path gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd golang.org/x/crypto@v0.36.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd golang.org/x/crypto@v0.36.0 CVE-2025-58181 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd stdlib@v1.24.9 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd-shim-runc-v2 github.com/containerd/containerd/v2@v2.1.5-k3s1 CVE-2024-25621 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/containerd-shim-runc-v2 stdlib@v1.24.9 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/crictl stdlib@v1.25.5 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/crictl stdlib@v1.25.5 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/ctr github.com/containerd/containerd/v2@v2.1.5-k3s1 CVE-2024-25621 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/ctr github.com/opencontainers/selinux@v1.12.0 CVE-2025-52881 none not affected vulnerable code not in execute path gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/ctr stdlib@v1.24.9 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/kubectl stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not in execute path gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/kubelet github.com/opencontainers/selinux@v1.11.1 CVE-2025-52881 none not affected vulnerable code not in execute path gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/kubelet golang.org/x/crypto@v0.36.0 CVE-2025-47914 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/kubelet golang.org/x/crypto@v0.36.0 CVE-2025-58181 none not affected vulnerable code not in execute path gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/kubelet stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not in execute path gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/runc stdlib@v1.24.11 CVE-2025-61726 none not affected vulnerable code not in execute path gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/runc stdlib@v1.24.11 CVE-2025-61728 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.34.3-rke2r1 false RKE2 v1.34.3 bin/runc stdlib@v1.24.11 CVE-2025-61730 none not affected vulnerable code not in execute path gobinary