Search:
| Image | Mirrored | Release | Binary/Package | Dependency | Vulnerability ID (CVE) | Severity | Status | Justification (for status not affected) | Type (language or OS) |
|---|---|---|---|---|---|---|---|---|---|
| rancher/hardened-addon-resizer:1.8.23-build20251204 | false | RKE2 v1.34.3 | pod_nanny | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-addon-resizer:1.8.23-build20251204 | false | RKE2 v1.34.3 | pod_nanny | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-addon-resizer:1.8.23-build20251204 | false | RKE2 v1.34.3 | pod_nanny | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | glibc | glibc@2.38-150600.14.37.1 | SUSE-SU-2026:0371-1 | HIGH | affected | sles | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | calicoctl | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | calicoctl | stdlib@v1.24.11 | CVE-2025-61728 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | calicoctl | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | calicoctl | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/bandwidth | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/bandwidth | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/bond | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/bridge | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/bridge | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/calico | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/calico | stdlib@v1.24.11 | CVE-2025-61728 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/calico | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/calico | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/calico-ipam | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/calico-ipam | stdlib@v1.24.11 | CVE-2025-61728 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/calico-ipam | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/calico-ipam | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/dhcp | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/dhcp | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/dummy | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/dummy | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/firewall | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/firewall | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/flannel | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/host-device | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/host-device | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/host-local | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/host-local | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/install | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/install | stdlib@v1.24.11 | CVE-2025-61728 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/install | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/install | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/ipvlan | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/ipvlan | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/loopback | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/loopback | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/macvlan | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/macvlan | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/portmap | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/portmap | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/ptp | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/ptp | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/sbr | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/sbr | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/static | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/static | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/tap | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/tap | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/tuning | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/tuning | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/vlan | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/vlan | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/vrf | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/vrf | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/calico-node | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/calico-node | stdlib@v1.24.11 | CVE-2025-61728 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/calico-node | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/calico-node | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/check-status | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/check-status | stdlib@v1.24.11 | CVE-2025-61728 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/check-status | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/check-status | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/kube-controllers | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/kube-controllers | stdlib@v1.24.11 | CVE-2025-61728 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/kube-controllers | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/kube-controllers | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/local/bin/flexvol/flexvoldriver | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/local/bin/flexvol/flexvoldriver | stdlib@v1.24.11 | CVE-2025-61728 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/local/bin/flexvol/flexvoldriver | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/local/bin/flexvol/flexvoldriver | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-cluster-autoscaler:v1.10.2-build20251204 | false | RKE2 v1.34.3 | cluster-proportional-autoscaler | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-cluster-autoscaler:v1.10.2-build20251204 | false | RKE2 v1.34.3 | cluster-proportional-autoscaler | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-coredns:v1.13.1-build20251204 | false | RKE2 v1.34.3 | busybox | busybox@1.37.0-150700.18.7.1 | SUSE-SU-2026:0235-1 | HIGH | affected | sles | |
| rancher/hardened-coredns:v1.13.1-build20251204 | false | RKE2 v1.34.3 | glibc | glibc@2.38-150600.14.37.1 | SUSE-SU-2026:0371-1 | HIGH | affected | sles | |
| rancher/hardened-coredns:v1.13.1-build20251204 | false | RKE2 v1.34.3 | coredns | github.com/coredns/coredns@v1.13.1 | CVE-2025-68151 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-coredns:v1.13.1-build20251204 | false | RKE2 v1.34.3 | coredns | github.com/expr-lang/expr@v1.17.6 | CVE-2025-68156 | HIGH | affected | gobinary | |
| rancher/hardened-coredns:v1.13.1-build20251204 | false | RKE2 v1.34.3 | coredns | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-coredns:v1.13.1-build20251204 | false | RKE2 v1.34.3 | coredns | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-coredns:v1.13.1-build20251204 | false | RKE2 v1.34.3 | coredns | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-dns-node-cache:1.26.7-build20251204 | false | RKE2 v1.34.3 | busybox | busybox@1.37.0-150700.18.7.1 | SUSE-SU-2026:0235-1 | HIGH | affected | sles | |
| rancher/hardened-dns-node-cache:1.26.7-build20251204 | false | RKE2 v1.34.3 | glibc | glibc@2.38-150600.14.37.1 | SUSE-SU-2026:0371-1 | HIGH | affected | sles | |
| rancher/hardened-dns-node-cache:1.26.7-build20251204 | false | RKE2 v1.34.3 | node-cache | github.com/coredns/coredns@v1.13.1 | CVE-2025-68151 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-dns-node-cache:1.26.7-build20251204 | false | RKE2 v1.34.3 | node-cache | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-dns-node-cache:1.26.7-build20251204 | false | RKE2 v1.34.3 | node-cache | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-dns-node-cache:1.26.7-build20251204 | false | RKE2 v1.34.3 | node-cache | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-etcd:v3.6.6-k3s1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/etcd | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-etcd:v3.6.6-k3s1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/etcd | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-etcd:v3.6.6-k3s1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/etcd | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-etcd:v3.6.6-k3s1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/etcdctl | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-etcd:v3.6.6-k3s1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/etcdctl | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-flannel:v0.27.4-build20251204 | false | RKE2 v1.34.3 | busybox | busybox@1.37.0-150700.18.7.1 | SUSE-SU-2026:0235-1 | HIGH | affected | sles | |
| rancher/hardened-flannel:v0.27.4-build20251204 | false | RKE2 v1.34.3 | glibc | glibc@2.38-150600.14.37.1 | SUSE-SU-2026:0371-1 | HIGH | affected | sles | |
| rancher/hardened-flannel:v0.27.4-build20251204 | false | RKE2 v1.34.3 | opt/bin/flanneld | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-flannel:v0.27.4-build20251204 | false | RKE2 v1.34.3 | opt/bin/flanneld | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-flannel:v0.27.4-build20251204 | false | RKE2 v1.34.3 | opt/bin/flanneld | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-k8s-metrics-server:v0.8.0-build20251204 | false | RKE2 v1.34.3 | metrics-server | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-k8s-metrics-server:v0.8.0-build20251204 | false | RKE2 v1.34.3 | metrics-server | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-k8s-metrics-server:v0.8.0-build20251204 | false | RKE2 v1.34.3 | metrics-server | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | glibc | glibc@2.38-150600.14.37.1 | SUSE-SU-2026:0371-1 | HIGH | affected | sles | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | gpg2 | gpg2@2.4.4-150600.3.9.1 | SUSE-SU-2026:0215-1 | HIGH | affected | sles | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.22.1 | SUSE-SU-2026:0018-1 | HIGH | affected | sles | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.22.1 | SUSE-SU-2026:0373-1 | HIGH | affected | sles | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-apiserver | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-apiserver | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-apiserver | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-controller-manager | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-controller-manager | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-controller-manager | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-proxy | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-proxy | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-proxy | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-scheduler | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-scheduler | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-scheduler | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kubectl | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kubectl | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kubectl | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kubelet | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kubelet | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kubelet | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | libcrypto3 | libcrypto3@3.5.4-r0 | CVE-2025-69419 | HIGH | affected | alpine | |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | libcrypto3 | libcrypto3@3.5.4-r0 | CVE-2025-69421 | HIGH | affected | alpine | |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | libssl3 | libssl3@3.5.4-r0 | CVE-2025-69421 | HIGH | affected | alpine | |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.24.11 | CVE-2025-61728 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | usr/bin/helm | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | usr/bin/helm | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | usr/bin/helm | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/klipper-lb:v0.4.13 | false | RKE2 v1.34.3 | libcrypto3 | libcrypto3@3.3.3-r0 | CVE-2025-69419 | HIGH | affected | alpine | |
| rancher/klipper-lb:v0.4.13 | false | RKE2 v1.34.3 | libcrypto3 | libcrypto3@3.3.3-r0 | CVE-2025-69421 | HIGH | affected | alpine | |
| rancher/klipper-lb:v0.4.13 | false | RKE2 v1.34.3 | libssl3 | libssl3@3.3.3-r0 | CVE-2025-69421 | HIGH | affected | alpine | |
| rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.5 | true | RKE2 v1.34.3 | kube-webhook-certgen | stdlib@v1.25.4 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.5 | true | RKE2 v1.34.3 | kube-webhook-certgen | stdlib@v1.25.4 | CVE-2025-61728 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.5 | true | RKE2 v1.34.3 | kube-webhook-certgen | stdlib@v1.25.4 | CVE-2025-61729 | HIGH | affected | gobinary | |
| rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.5 | true | RKE2 v1.34.3 | kube-webhook-certgen | stdlib@v1.25.4 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.5 | true | RKE2 v1.34.3 | kube-webhook-certgen | stdlib@v1.25.4 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.5 | true | RKE2 v1.34.3 | kube-webhook-certgen | stdlib@v1.25.4 | CVE-2025-61727 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | stdlib@v1.23.1 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | stdlib@v1.23.1 | CVE-2025-61729 | HIGH | affected | gobinary | |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | stdlib@v1.23.1 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | stdlib@v1.23.1 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | stdlib@v1.23.1 | CVE-2025-47912 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | stdlib@v1.23.1 | CVE-2025-58188 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | stdlib@v1.23.1 | CVE-2025-61727 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | glib2-tools | glib2-tools@2.78.6-150600.4.22.1 | SUSE-SU-2026:0018-1 | HIGH | affected | sles | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | glib2-tools | glib2-tools@2.78.6-150600.4.22.1 | SUSE-SU-2026:0373-1 | HIGH | affected | sles | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | glibc | glibc@2.38-150600.14.37.1 | SUSE-SU-2026:0371-1 | HIGH | affected | sles | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | glibc-devel | glibc-devel@2.38-150600.14.37.1 | SUSE-SU-2026:0371-1 | HIGH | affected | sles | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | gpg2 | gpg2@2.4.4-150600.3.9.1 | SUSE-SU-2026:0215-1 | HIGH | affected | sles | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.22.1 | SUSE-SU-2026:0018-1 | HIGH | affected | sles | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | libgio-2_0-0 | libgio-2_0-0@2.78.6-150600.4.22.1 | SUSE-SU-2026:0373-1 | HIGH | affected | sles | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.22.1 | SUSE-SU-2026:0018-1 | HIGH | affected | sles | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | libglib-2_0-0 | libglib-2_0-0@2.78.6-150600.4.22.1 | SUSE-SU-2026:0373-1 | HIGH | affected | sles | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.22.1 | SUSE-SU-2026:0018-1 | HIGH | affected | sles | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | libgmodule-2_0-0 | libgmodule-2_0-0@2.78.6-150600.4.22.1 | SUSE-SU-2026:0373-1 | HIGH | affected | sles | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.22.1 | SUSE-SU-2026:0018-1 | HIGH | affected | sles | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | libgobject-2_0-0 | libgobject-2_0-0@2.78.6-150600.4.22.1 | SUSE-SU-2026:0373-1 | HIGH | affected | sles | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | dbg | stdlib@v1.25.5 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | dbg | stdlib@v1.25.5 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | dbg | stdlib@v1.25.5 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | nginx-ingress-controller | stdlib@v1.25.5 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | nginx-ingress-controller | stdlib@v1.25.5 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | nginx-ingress-controller | stdlib@v1.25.5 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | wait-shutdown | stdlib@v1.25.5 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | wait-shutdown | stdlib@v1.25.5 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | wait-shutdown | stdlib@v1.25.5 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/rke2-cloud-provider:v1.34.3-0.20251210094406-1ff6ebef7028-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/rke2-cloud-provider | github.com/expr-lang/expr@v1.17.6 | CVE-2025-68156 | HIGH | affected | gobinary | |
| rancher/rke2-cloud-provider:v1.34.3-0.20251210094406-1ff6ebef7028-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/rke2-cloud-provider | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-cloud-provider:v1.34.3-0.20251210094406-1ff6ebef7028-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/rke2-cloud-provider | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-cloud-provider:v1.34.3-0.20251210094406-1ff6ebef7028-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/rke2-cloud-provider | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd | stdlib@v1.24.9 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd | stdlib@v1.24.9 | CVE-2025-61729 | HIGH | affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd | stdlib@v1.24.9 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd | stdlib@v1.24.9 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd | stdlib@v1.24.9 | CVE-2025-61727 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd-shim-runc-v2 | stdlib@v1.24.9 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd-shim-runc-v2 | stdlib@v1.24.9 | CVE-2025-61729 | HIGH | affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd-shim-runc-v2 | stdlib@v1.24.9 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd-shim-runc-v2 | stdlib@v1.24.9 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd-shim-runc-v2 | stdlib@v1.24.9 | CVE-2025-61727 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/crictl | stdlib@v1.25.5 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/crictl | stdlib@v1.25.5 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/ctr | stdlib@v1.24.9 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/ctr | stdlib@v1.24.9 | CVE-2025-61729 | HIGH | affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/ctr | stdlib@v1.24.9 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/ctr | stdlib@v1.24.9 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/ctr | stdlib@v1.24.9 | CVE-2025-61727 | HIGH*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/kubectl | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/kubectl | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/kubectl | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/kubelet | stdlib@v1.24.11 | CVE-2025-61726 | MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/kubelet | stdlib@v1.24.11 | CVE-2025-61730 | LOW*Severity modified based on SUSE's CVE database and CVSS rating |
affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/kubelet | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/runc | stdlib@v1.24.11 | CVE-2025-68121 | HIGH | affected | gobinary | |
| rancher/hardened-addon-resizer:1.8.23-build20251204 | false | RKE2 v1.34.3 | pod_nanny | golang.org/x/net@v0.33.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-addon-resizer:1.8.23-build20251204 | false | RKE2 v1.34.3 | pod_nanny | golang.org/x/net@v0.33.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-addon-resizer:1.8.23-build20251204 | false | RKE2 v1.34.3 | pod_nanny | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-addon-resizer:1.8.23-build20251204 | false | RKE2 v1.34.3 | pod_nanny | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.2.3-150700.5.21.1 | SUSE-SU-2026:0309-1 | none | not affected | vulnerable code not in execute path | sles |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | libopenssl3 | libopenssl3@3.2.3-150700.5.21.1 | SUSE-SU-2026:0309-1 | none | not affected | vulnerable code not in execute path | sles |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | calicoctl | golang.org/x/crypto@v0.43.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | calicoctl | golang.org/x/crypto@v0.43.0 | CVE-2025-58181 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/bandwidth | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/bandwidth | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/bond | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/bond | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/bond | stdlib@v1.24.11 | CVE-2025-61730 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/bridge | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/bridge | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.43.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/calico | golang.org/x/crypto@v0.43.0 | CVE-2025-58181 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.43.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/calico-ipam | golang.org/x/crypto@v0.43.0 | CVE-2025-58181 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/dhcp | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/dhcp | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/dummy | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/dummy | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/firewall | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/firewall | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/flannel | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/flannel | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/flannel | stdlib@v1.24.11 | CVE-2025-61730 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/host-device | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/host-device | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/host-local | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/host-local | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/ipvlan | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/ipvlan | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/loopback | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/loopback | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/macvlan | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/macvlan | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/portmap | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/portmap | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/ptp | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/ptp | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/sbr | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/sbr | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/static | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/static | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/tap | github.com/opencontainers/selinux@v1.12.0 | CVE-2025-52881 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/tap | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/tap | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/tuning | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/tuning | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/vlan | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/vlan | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/vrf | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | opt/cni/bin/vrf | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/calico-node | golang.org/x/crypto@v0.43.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/calico-node | golang.org/x/crypto@v0.43.0 | CVE-2025-58181 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/kube-controllers | golang.org/x/crypto@v0.43.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-calico:v3.31.2-build20251205 | false | RKE2 v1.34.3 | usr/bin/kube-controllers | golang.org/x/crypto@v0.43.0 | CVE-2025-58181 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-cluster-autoscaler:v1.10.2-build20251204 | false | RKE2 v1.34.3 | cluster-proportional-autoscaler | golang.org/x/net@v0.36.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-cluster-autoscaler:v1.10.2-build20251204 | false | RKE2 v1.34.3 | cluster-proportional-autoscaler | golang.org/x/oauth2@v0.23.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-cluster-autoscaler:v1.10.2-build20251204 | false | RKE2 v1.34.3 | cluster-proportional-autoscaler | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-cluster-autoscaler:v1.10.2-build20251204 | false | RKE2 v1.34.3 | cluster-proportional-autoscaler | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-coredns:v1.13.1-build20251204 | false | RKE2 v1.34.3 | coredns | github.com/quic-go/quic-go@v0.55.0 | CVE-2025-64702 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-coredns:v1.13.1-build20251204 | false | RKE2 v1.34.3 | coredns | golang.org/x/crypto@v0.42.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-coredns:v1.13.1-build20251204 | false | RKE2 v1.34.3 | coredns | golang.org/x/crypto@v0.42.0 | CVE-2025-58181 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-coredns:v1.13.1-build20251204 | false | RKE2 v1.34.3 | coredns | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-dns-node-cache:1.26.7-build20251204 | false | RKE2 v1.34.3 | node-cache | github.com/quic-go/quic-go@v0.55.0 | CVE-2025-64702 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-dns-node-cache:1.26.7-build20251204 | false | RKE2 v1.34.3 | node-cache | golang.org/x/crypto@v0.43.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-dns-node-cache:1.26.7-build20251204 | false | RKE2 v1.34.3 | node-cache | golang.org/x/crypto@v0.43.0 | CVE-2025-58181 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-dns-node-cache:1.26.7-build20251204 | false | RKE2 v1.34.3 | node-cache | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-etcd:v3.6.6-k3s1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/etcd | golang.org/x/crypto@v0.36.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-etcd:v3.6.6-k3s1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/etcd | golang.org/x/crypto@v0.36.0 | CVE-2025-58181 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-etcd:v3.6.6-k3s1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/etcd | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-etcd:v3.6.6-k3s1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/etcdctl | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-etcd:v3.6.6-k3s1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/etcdctl | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-flannel:v0.27.4-build20251204 | false | RKE2 v1.34.3 | opt/bin/flanneld | golang.org/x/crypto@v0.36.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-flannel:v0.27.4-build20251204 | false | RKE2 v1.34.3 | opt/bin/flanneld | golang.org/x/crypto@v0.36.0 | CVE-2025-58181 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-flannel:v0.27.4-build20251204 | false | RKE2 v1.34.3 | opt/bin/flanneld | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-k8s-metrics-server:v0.8.0-build20251204 | false | RKE2 v1.34.3 | metrics-server | golang.org/x/crypto@v0.38.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-k8s-metrics-server:v0.8.0-build20251204 | false | RKE2 v1.34.3 | metrics-server | golang.org/x/crypto@v0.38.0 | CVE-2025-58181 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-k8s-metrics-server:v0.8.0-build20251204 | false | RKE2 v1.34.3 | metrics-server | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.2.3-150700.5.21.1 | SUSE-SU-2026:0309-1 | none | not affected | vulnerable code not in execute path | sles |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | libopenssl3 | libopenssl3@3.2.3-150700.5.21.1 | SUSE-SU-2026:0309-1 | none | not affected | vulnerable code not in execute path | sles |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | openssl-3 | openssl-3@3.2.3-150700.5.21.1 | SUSE-SU-2026:0309-1 | none | not affected | vulnerable code not in execute path | sles |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-apiserver | github.com/opencontainers/selinux@v1.11.1 | CVE-2025-52881 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.36.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-apiserver | golang.org/x/crypto@v0.36.0 | CVE-2025-58181 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-apiserver | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-controller-manager | github.com/opencontainers/selinux@v1.11.1 | CVE-2025-52881 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.36.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-controller-manager | golang.org/x/crypto@v0.36.0 | CVE-2025-58181 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-controller-manager | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.36.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-proxy | golang.org/x/crypto@v0.36.0 | CVE-2025-58181 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-proxy | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.36.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-scheduler | golang.org/x/crypto@v0.36.0 | CVE-2025-58181 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kube-scheduler | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kubectl | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kubelet | github.com/opencontainers/selinux@v1.11.1 | CVE-2025-52881 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kubelet | golang.org/x/crypto@v0.36.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kubelet | golang.org/x/crypto@v0.36.0 | CVE-2025-58181 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/hardened-kubernetes:v1.34.3-rke2r1-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/kubelet | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | libcrypto3 | libcrypto3@3.5.4-r0 | CVE-2025-15467 | none | not affected | vulnerable code not in execute path | alpine |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | libssl3 | libssl3@3.5.4-r0 | CVE-2025-15467 | none | not affected | vulnerable code not in execute path | alpine |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | libssl3 | libssl3@3.5.4-r0 | CVE-2025-69419 | none | not affected | vulnerable code not in execute path | alpine |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/klipper-helm:v0.9.12-build20251215 | false | RKE2 v1.34.3 | usr/bin/helm | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/klipper-lb:v0.4.13 | false | RKE2 v1.34.3 | libcrypto3 | libcrypto3@3.3.3-r0 | CVE-2025-15467 | none | not affected | vulnerable code not in execute path | alpine |
| rancher/klipper-lb:v0.4.13 | false | RKE2 v1.34.3 | libssl3 | libssl3@3.3.3-r0 | CVE-2025-15467 | none | not affected | vulnerable code not in execute path | alpine |
| rancher/klipper-lb:v0.4.13 | false | RKE2 v1.34.3 | libssl3 | libssl3@3.3.3-r0 | CVE-2025-69419 | none | not affected | vulnerable code not in execute path | alpine |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | golang.org/x/net@v0.31.0 | CVE-2025-22870 | none | not affected | vulnerable code not present | gobinary |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | golang.org/x/net@v0.31.0 | CVE-2025-22872 | none | not affected | vulnerable code not present | gobinary |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | golang.org/x/oauth2@v0.24.0 | CVE-2025-22868 | none | not affected | vulnerable code not present | gobinary |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | stdlib@v1.23.1 | CVE-2025-47907 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | stdlib@v1.23.1 | CVE-2025-58183 | none | not affected | vulnerable code not present | gobinary |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | stdlib@v1.23.1 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 | true | RKE2 v1.34.3 | snapshot-controller | stdlib@v1.23.1 | CVE-2025-61725 | none | not affected | vulnerable code not present | gobinary |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | libopenssl-3-devel | libopenssl-3-devel@3.2.3-150700.5.21.1 | SUSE-SU-2026:0309-1 | none | not affected | vulnerable code not in execute path | sles |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | libopenssl-3-fips-provider | libopenssl-3-fips-provider@3.2.3-150700.5.21.1 | SUSE-SU-2026:0309-1 | none | not affected | vulnerable code not in execute path | sles |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | libopenssl3 | libopenssl3@3.2.3-150700.5.21.1 | SUSE-SU-2026:0309-1 | none | not affected | vulnerable code not in execute path | sles |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | openssl-3 | openssl-3@3.2.3-150700.5.21.1 | SUSE-SU-2026:0309-1 | none | not affected | vulnerable code not in execute path | sles |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | dbg | stdlib@v1.25.5 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | nginx-ingress-controller | stdlib@v1.25.5 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/nginx-ingress-controller:v1.13.5-hardened2 | false | RKE2 v1.34.3 | wait-shutdown | stdlib@v1.25.5 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/rke2-cloud-provider:v1.34.3-0.20251210094406-1ff6ebef7028-build20251210 | false | RKE2 v1.34.3 | usr/local/bin/rke2-cloud-provider | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd | github.com/containerd/containerd/v2@v2.1.5-k3s1 | CVE-2024-25621 | none | not affected | vulnerable code not present | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd | github.com/opencontainers/selinux@v1.12.0 | CVE-2025-52881 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd | golang.org/x/crypto@v0.36.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd | golang.org/x/crypto@v0.36.0 | CVE-2025-58181 | none | not affected | vulnerable code not present | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd | stdlib@v1.24.9 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd-shim-runc-v2 | github.com/containerd/containerd/v2@v2.1.5-k3s1 | CVE-2024-25621 | none | not affected | vulnerable code not present | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/containerd-shim-runc-v2 | stdlib@v1.24.9 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/crictl | stdlib@v1.25.5 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/crictl | stdlib@v1.25.5 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/ctr | github.com/containerd/containerd/v2@v2.1.5-k3s1 | CVE-2024-25621 | none | not affected | vulnerable code not present | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/ctr | github.com/opencontainers/selinux@v1.12.0 | CVE-2025-52881 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/ctr | stdlib@v1.24.9 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/kubectl | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/kubelet | github.com/opencontainers/selinux@v1.11.1 | CVE-2025-52881 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/kubelet | golang.org/x/crypto@v0.36.0 | CVE-2025-47914 | none | not affected | vulnerable code not present | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/kubelet | golang.org/x/crypto@v0.36.0 | CVE-2025-58181 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/kubelet | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/runc | stdlib@v1.24.11 | CVE-2025-61726 | none | not affected | vulnerable code not in execute path | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/runc | stdlib@v1.24.11 | CVE-2025-61728 | none | not affected | vulnerable code not present | gobinary |
| rancher/rke2-runtime:v1.34.3-rke2r1 | false | RKE2 v1.34.3 | bin/runc | stdlib@v1.24.11 | CVE-2025-61730 | none | not affected | vulnerable code not in execute path | gobinary |