Improper Certificate Validation Affecting microshift-gateway-api-release-info package, versions *


Severity

Recommended
0.0
high
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL9-MICROSHIFTGATEWAYAPIRELEASEINFO-15692362
  • published19 Mar 2026
  • disclosed6 Mar 2026

Introduced: 6 Mar 2026

NewCVE-2026-27137  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:9 microshift-gateway-api-release-info.

NVD Description

Note: Versions mentioned in the description apply only to the upstream microshift-gateway-api-release-info package and not the microshift-gateway-api-release-info package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.

CVSS Base Scores

version 3.1