CLEANSTART-2026-CA79883

See a problem?
Import Source
https://github.com/cleanstart-dev/cleanstart-security-advisories/blob/main/advisories/2026/CLEANSTART-2026-CA79883.json
JSON Data
https://api.test.osv.dev/v1/vulns/CLEANSTART-2026-CA79883
Upstream
  • GHSA-6v2p-p943-phr9
  • GHSA-hcg3-p754-cr77
  • GHSA-qxp5-gw88-xv66
Published
2026-02-13T00:40:14.901695Z
Modified
2026-02-16T11:30:14.835795Z
Summary
Security fixes for GHSA-6v2p-p943-phr9, GHSA-c6gw-w398-hv78, GHSA-f6x5-jh6r-wrfv, GHSA-hcg3-p754-cr77, GHSA-j5w8-q4qc-rx2x, GHSA-qxp5-gw88-xv66, GHSA-v778-237x-gjrc, GHSA-vvgc-356p-c3xw applied in versions: 1.15.0-r1
Details

Multiple security vulnerabilities affect the rabbitmq-messaging-topology-operator package. These issues are resolved in later releases. See references for individual vulnerability details.

References

Affected packages

CleanStart / rabbitmq-messaging-topology-operator

Package

Name
rabbitmq-messaging-topology-operator

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.15.0-r1

Database specific

source
"https://github.com/cleanstart-dev/cleanstart-security-advisories/blob/main/advisories/2026/CLEANSTART-2026-CA79883.json"