SB2026042003 - Red Hat Enterprise Linux 10 update for delve
Published: April 20, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Improper Authorization (CVE-ID: CVE-2026-27137)
The vulnerability allows a remote attacker to bypass email address constraints during X.509 certificate chain verification.
The vulnerability exists due to improper enforcement of email constraints in crypto/x509 when verifying certificate chains containing multiple email address constraints with shared local parts but different domains. A remote attacker can present a certificate chain with malformed email constraints to cause only the last constraint to be applied, leading to improper validation.
This issue only affects Go 1.26 and requires the certificate chain to chain to a trusted root. A trusted CA must issue the malicious certificate.
2) Input validation error (CVE-ID: CVE-2026-25679)
The vulnerability allows a remote attacker to bypass URL parsing validation and potentially access unintended resources.
The vulnerability exists due to insufficient validation in net/url.Parse when handling IPv6 literals not located at the start of the host component. A remote attacker can send a specially crafted URL with an IPv6 literal preceded by garbage characters to bypass proper parsing and potentially redirect requests.
This issue affects any application using net/url.Parse to process untrusted URLs. The incorrect parsing may lead to misrouting or injection of unintended host components.
Remediation
Install update from vendor's website.