Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

In early February 2026, VMware (now part of Broadcom) issued a comprehensive wave of security advisories affecting multiple components of the Tanzu platform ecosystem. Between January 26 and February 1, administrators running Tanzu-based cloud-native infrastructure were advised to apply critical updates across buildpacks, stemcells, and platform services.
VMware Tanzu is Broadcom’s enterprise Kubernetes and cloud-native application platform, designed to help organizations build, run, and manage modern applications across multiple clouds and on-premises environments. The platform encompasses a broad ecosystem of tools including:
With Broadcom’s acquisition of VMware, Tanzu has become a cornerstone of the company’s enterprise software strategy, particularly for organizations embracing platform engineering and DevOps practices.
According to the Canadian Centre for Cyber Security advisory AV26-075, VMware published security updates addressing vulnerabilities in the following Tanzu components:
Platform Services for VMware Tanzu Platform
Python Buildpack
Ruby Buildpack
Service Publisher for VMware Tanzu Platform
Stemcells (Ubuntu Jammy FIPS)
Stemcells (Ubuntu Noble)
Stemcells (Windows)
Tanzu Hub
Buildpacks are a key component of cloud-native application deployment. They automatically detect application dependencies and package applications into container images without requiring developers to write Dockerfiles. The Python and Ruby buildpacks affected by these vulnerabilities are used extensively for deploying applications written in these popular programming languages across Tanzu environments.
Stemcells are versioned operating system images that BOSH (the deployment orchestration tool) uses to create virtual machines for Tanzu Platform components, Kubernetes nodes, and service instances. They provide:
The updates to Ubuntu Jammy FIPS, Ubuntu Noble, and Windows stemcells ensure that the underlying infrastructure remains secure and compliant with the latest security standards.
Platform Services and Tanzu Hub represent core management capabilities within Tanzu Platform 10.3, which was released in August 2025. Tanzu Hub provides centralized visibility into applications, components, and security vulnerabilities across the entire platform estate.
These security updates demonstrate Broadcom’s ongoing investment in maintaining and securing VMware’s Kubernetes and cloud-native infrastructure stack. Despite organizational changes following the acquisition, the Tanzu division continues to deliver regular security patches and feature enhancements.
Vulnerabilities in buildpacks and stemcells represent supply chain security risks. Because these components are foundational to how applications are built and deployed, weaknesses here can affect every application running on the platform. Addressing these vulnerabilities helps organizations maintain a secure software supply chain.
For enterprises operating in regulated industries (finance, healthcare, government), maintaining up-to-date FIPS-compliant stemcells is critical for certification and compliance requirements. The updates to Ubuntu Jammy FIPS stemcells ensure continued compliance with federal cryptographic standards.
These updates reinforce VMware’s strategic focus on platform engineering and developer experience. By maintaining secure, well-supported buildpacks and platform services, Tanzu enables organizations to establish reliable “golden paths” to production while ensuring applications remain secure and resilient.
Identify which Tanzu components you’re running:
bash
# Check installed stemcells
bosh stemcells
# List buildpacks
cf buildpacks
# Verify platform version
cf version
Access the Broadcom Support Portal to download patches:
Note: As of March 2025, Tanzu product downloads require entitlement. Ensure you have proper access credentials.
Update stemcells across your BOSH deployments:
bash
# Upload new stemcell
bosh upload-stemcell <stemcell-tarball>
# Verify upload
bosh stemcells
# Update deployments to use new stemcell
bosh deploy <manifest> --recreate
For Platform for Cloud Foundry environments:
bash
# Download updated buildpack
# Upload to Cloud Foundry
cf update-buildpack <buildpack-name> -p <buildpack-zip>
# Verify update
cf buildpacks
After updating buildpacks, restage affected applications to incorporate security fixes:
bash
# Identify apps using affected buildpacks
cf apps
# Restage applications
cf restage <app-name>
For Tanzu Platform components, follow the upgrade procedures in the official documentation:
Use Tanzu Vulnerability Insights (if available) to confirm vulnerabilities have been addressed:
Before rolling updates to production:
Expanded capabilities including:
These developments underscore Broadcom’s long-term commitment to Tanzu as a comprehensive platform for modern application development, deployment, and management.
The February 2026 Tanzu security updates represent routine but critical maintenance for enterprise cloud-native infrastructure. By addressing vulnerabilities across buildpacks, stemcells, and platform services, VMware (Broadcom) demonstrates its continued commitment to securing the Tanzu ecosystem.
For organizations running Tanzu platforms, these updates should be prioritized and applied systematically. The affected components—particularly buildpacks and stemcells—are foundational to application security and platform integrity. Delaying updates increases exposure to potential vulnerabilities and complicates future upgrade paths.