Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-41602 (GCVE-0-2026-41602)
Vulnerability from cvelistv5 – Published: 2026-04-28 09:19 – Updated: 2026-04-28 14:10- CWE-190 - Integer Overflow or Wraparound
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache Software Foundation | Apache Thrift |
Affected:
0 , < 0.23.0
(semver)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2026-04-28T09:51:57.579Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2026/04/28/6"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-41602",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-28T14:09:11.801841Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-28T14:10:24.945Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Apache Thrift",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "0.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "\uae40\ubc94\uc218"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eInteger Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation\u003c/p\u003e\u003cp\u003eThis issue affects Apache Thrift: before 0.23.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 0.23.0, which fixes the issue.\u003c/p\u003e"
}
],
"value": "Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation\n\nThis issue affects Apache Thrift: before 0.23.0.\n\nUsers are recommended to upgrade to version 0.23.0, which fixes the issue."
}
],
"metrics": [
{
"other": {
"content": {
"text": "important"
},
"type": "Textual description of severity"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-190",
"description": "CWE-190 Integer Overflow or Wraparound",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-28T09:19:06.646Z",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Apache Thrift: Go TFramedTransport uint32 overflow",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2026-41602",
"datePublished": "2026-04-28T09:19:06.646Z",
"dateReserved": "2026-04-21T21:28:29.894Z",
"dateUpdated": "2026-04-28T14:10:24.945Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-41602",
"date": "2026-05-08",
"epss": "0.00176",
"percentile": "0.38705"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-41602\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2026-04-28T10:16:03.000\",\"lastModified\":\"2026-04-28T18:40:25.530\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation\\n\\nThis issue affects Apache Thrift: before 0.23.0.\\n\\nUsers are recommended to upgrade to version 0.23.0, which fixes the issue.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:thrift:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.23.0\",\"matchCriteriaId\":\"0CE7604A-DA43-44E3-9840-9E3696223DD5\"}]}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Release Notes\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/04/28/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2026/04/28/6\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2026-04-28T09:51:57.579Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-41602\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-28T14:09:11.801841Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-28T14:08:25.350Z\"}}], \"cna\": {\"title\": \"Apache Thrift: Go TFramedTransport uint32 overflow\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"\\uae40\\ubc94\\uc218\"}], \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"important\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Thrift\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"0.23.0\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation\\n\\nThis issue affects Apache Thrift: before 0.23.0.\\n\\nUsers are recommended to upgrade to version 0.23.0, which fixes the issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eInteger Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation\u003c/p\u003e\u003cp\u003eThis issue affects Apache Thrift: before 0.23.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 0.23.0, which fixes the issue.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-190\", \"description\": \"CWE-190 Integer Overflow or Wraparound\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2026-04-28T09:19:06.646Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-41602\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-28T14:10:24.945Z\", \"dateReserved\": \"2026-04-21T21:28:29.894Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2026-04-28T09:19:06.646Z\", \"assignerShortName\": \"apache\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:14162
Vulnerability from csaf_redhat - Published: 2026-05-06 13:54 - Updated: 2026-05-07 21:44A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.
A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).
A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.
A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).
A flaw was found in the Apache Thrift TFramedTransport Go language implementation. This integer overflow or wraparound vulnerability could potentially allow an attacker to cause unexpected behavior or resource exhaustion, leading to a denial of service.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat build of OpenTelemetry 3.9.3 has been released",
"title": "Topic"
},
{
"category": "general",
"text": "This release of the Red Hat build of OpenTelemetry provides security improvements.\n\n\nBreaking changes:\n\n* None\n\n\nDeprecations:\n\n* None\n\n\nTechnology Preview features:\n\n* None\n\n\nEnhancements:\n\n* None\n\n\nBug fixes:\n\n* TOCTOU race condition in libcap cap_set_file() function is fixed. Previously, the cap_set_file() function in libcap contained a Time-of-check-to-time-of-use (TOCTOU) race condition. A local unprivileged user with write access to a parent directory could exploit this vulnerability to redirect file capability updates to an attacker-controlled file. This flaw allowed an attacker to inject capabilities into or strip capabilities from unintended executables, leading to privilege escalation. With this update, the race condition in cap_set_file() is fixed. As a result, file capability updates are applied to the intended target files, and the vulnerability is no longer exploitable. For more information, see https://access.redhat.com/security/cve/CVE-2026-4878.\n\n* Integer overflow vulnerability in Apache Thrift TFramedTransport Go implementation is fixed. Previously, the Apache Thrift TFramedTransport Go language implementation contained an integer overflow or wraparound vulnerability. An attacker could exploit this flaw to cause unexpected behavior or resource exhaustion, leading to a denial of service. With this update, the integer overflow issue is fixed. As a result, TFramedTransport correctly handles integer values, and the vulnerability is no longer exploitable. For more information, see https://access.redhat.com/security/cve/CVE-2026-41602.\n\n* Denial of service vulnerability in Go crypto/x509 and crypto/tls packages is fixed. Previously, the Go standard library packages crypto/x509 and crypto/tls did not properly limit the number of intermediate certificates processed during certificate chain building. An attacker could provide an excessive number of intermediate certificates, causing an uncontrolled amount of work. This flaw could result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users. With this update, the number of intermediate certificates processed during certificate chain building is properly limited. As a result, the packages handle certificate chains efficiently, and the vulnerability is no longer exploitable. For more information, see https://access.redhat.com/security/cve/CVE-2026-32280.\n\n* TLS 1.3 connection deadlock vulnerability is fixed. Previously, if one side of a TLS 1.3 connection sent multiple key update messages post-handshake in a single record, the connection could deadlock. This deadlock caused uncontrolled consumption of resources and could lead to a denial of service. With this update, TLS 1.3 connections correctly handle multiple key update messages in a single record. As a result, connections no longer deadlock, and the vulnerability is no longer exploitable. For more information about CVE-2026-32283, see https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU.\n\n* IPC API vulnerability in systemd is fixed. Previously, system and service manager systemd contained a flaw that an unprivileged user could exploit by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this flaw could lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), this flaw caused systemd to assert and freeze, resulting in a denial of service (DoS). With this update, systemd correctly validates IPC API calls. As a result, the vulnerability is no longer exploitable. For more information, see https://access.redhat.com/security/cve/CVE-2026-29111.\n\n\nKnown issues:\n\n* The filesystem scraper does not produce the system.filesystem.inodes.usage and system.filesystem.usage metrics in the Host Metrics Receiver after upgrading from Collector version 0.142.0 to 0.143.0 or later. No known workaround exists. For more information, see https://issues.redhat.com/browse/TRACING-5963.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:14162",
"url": "https://access.redhat.com/errata/RHSA-2026:14162"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-29111",
"url": "https://access.redhat.com/security/cve/CVE-2026-29111"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32280",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-32283",
"url": "https://access.redhat.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-41602",
"url": "https://access.redhat.com/security/cve/CVE-2026-41602"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4878",
"url": "https://access.redhat.com/security/cve/CVE-2026-4878"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/red_hat_build_of_opentelemetry",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/red_hat_build_of_opentelemetry"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_14162.json"
}
],
"title": "Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.9.3 release",
"tracking": {
"current_release_date": "2026-05-07T21:44:20+00:00",
"generator": {
"date": "2026-05-07T21:44:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:14162",
"initial_release_date": "2026-05-06T13:54:24+00:00",
"revision_history": [
{
"date": "2026-05-06T13:54:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-06T13:54:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-07T21:44:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 3.9.3",
"product": {
"name": "Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.9::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256%3A736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778059129"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel9@sha256%3A5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778056267"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel9-operator@sha256%3Aa12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778056233"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel9@sha256%3Ac8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778056245"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel9@sha256%3A3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778056267"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel9-operator@sha256%3Afcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778056233"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel9@sha256%3Ac87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778056245"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel9@sha256%3A36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778056267"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel9-operator@sha256%3Ad52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778056233"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel9@sha256%3A676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778056245"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel9@sha256%3A265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778056267"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel9-operator@sha256%3A109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778056233"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"product_id": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel9@sha256%3Aa2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778056245"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ali Raza"
]
}
],
"cve": "CVE-2026-4878",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2026-03-26T06:56:21.213270+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451615"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libcap: libcap: Privilege escalation via TOCTOU race condition in cap_set_file()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important flaw. A Time-of-Check-to-Time-of-Use (TOCTOU) race condition in libcap\u0027s cap_set_file() allows a local unprivileged user to escalate privileges. An attacker with write access to a parent directory can exploit a narrow window during file capability updates to redirect capabilities to an attacker-controlled file. This can lead to the injection of elevated privileges into an unintended executable when privileged processes, such as setcap or container tooling, invoke cap_set_file() on attacker-influenced paths.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4878"
},
{
"category": "external",
"summary": "RHBZ#2451615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451615"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4878"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4878",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4878"
},
{
"category": "external",
"summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2447554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447554"
}
],
"release_date": "2026-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-06T13:54:24+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:14162"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libcap: libcap: Privilege escalation via TOCTOU race condition in cap_set_file()"
},
{
"cve": "CVE-2026-29111",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"discovery_date": "2026-03-23T22:01:54.593547+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2450505"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-29111"
},
{
"category": "external",
"summary": "RHBZ#2450505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-29111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29111"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-29111",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29111"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a",
"url": "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6",
"url": "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412",
"url": "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd",
"url": "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f",
"url": "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f",
"url": "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69",
"url": "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6",
"url": "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c",
"url": "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8",
"url": "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764",
"url": "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764"
}
],
"release_date": "2026-03-23T21:03:56.120000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-06T13:54:24+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:14162"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data"
},
{
"cve": "CVE-2026-32280",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-04-08T02:01:19.572351+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456339"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Go standard library packages `crypto/x509` and `crypto/tls`. During the process of building a certificate chain, an attacker can provide a large number of intermediate certificates. This excessive input is not properly limited, leading to an uncontrolled amount of work being performed. This can result in a denial of service (DoS) condition, making the affected system or application unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32280"
},
{
"category": "external",
"summary": "RHBZ#2456339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456339"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32280"
},
{
"category": "external",
"summary": "https://go.dev/cl/758320",
"url": "https://go.dev/cl/758320"
},
{
"category": "external",
"summary": "https://go.dev/issue/78282",
"url": "https://go.dev/issue/78282"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4947",
"url": "https://pkg.go.dev/vuln/GO-2026-4947"
}
],
"release_date": "2026-04-08T01:06:58.595000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-06T13:54:24+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:14162"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building"
},
{
"cve": "CVE-2026-32283",
"cwe": {
"id": "CWE-764",
"name": "Multiple Locks of a Critical Resource"
},
"discovery_date": "2026-04-08T02:01:16.213799+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2456338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the `crypto/tls` package within the Go (golang) standard library, specifically affecting TLS 1.3 connections. A remote attacker can exploit this vulnerability by sending multiple key update messages in a single record after the handshake. This can cause the connection to deadlock, leading to uncontrolled consumption of resources and ultimately a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-32283"
},
{
"category": "external",
"summary": "RHBZ#2456338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2456338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32283"
},
{
"category": "external",
"summary": "https://go.dev/cl/763767",
"url": "https://go.dev/cl/763767"
},
{
"category": "external",
"summary": "https://go.dev/issue/78334",
"url": "https://go.dev/issue/78334"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU",
"url": "https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4870",
"url": "https://pkg.go.dev/vuln/GO-2026-4870"
}
],
"release_date": "2026-04-08T01:06:57.670000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-06T13:54:24+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:14162"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages"
},
{
"cve": "CVE-2026-41602",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2026-04-28T10:01:16.099816+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2463407"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Apache Thrift TFramedTransport Go language implementation. This integer overflow or wraparound vulnerability could potentially allow an attacker to cause unexpected behavior or resource exhaustion, leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/apache/thrift: Apache Thrift: Integer Overflow in TFramedTransport Go implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-41602"
},
{
"category": "external",
"summary": "RHBZ#2463407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2463407"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-41602",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41602"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-41602",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41602"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/04/28/6",
"url": "http://www.openwall.com/lists/oss-security/2026/04/28/6"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql",
"url": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql"
}
],
"release_date": "2026-04-28T09:19:06.646000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-06T13:54:24+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:14162"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:265d8d864589e9ca6739e5eff46be545dc531aa6aa72378674b3ae9ff48f14ac_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:3485dd7a7615da6e658547c117818f41c855aa8fcff80b609e56afec46e00546_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:36790acac3369dd38803aca4433376edfa9edc8785ea0b61ec95b931effddf00_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:5adac8b8aa26beaa38c4a0d20f0271890c0fbaf06b9bcbc7c00a3e27cd1a4c5b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:736f03edb0dfea64fcb9a723dc8a01d8ffd4f2c5b952b3a8f1b2ab6b7320af4b_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:109f44564a590b7dbdf7337f93a5297875f58e2810123a134a5386a5ba8bd62b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a12ee44613f8bb32f083f719b08af74a8e72815ab35156cb23242f2889745865_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:d52121422c85bc4b79590e67bf047d90b50b763425fcf5676265f65eb3faa1e2_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:fcd49001027e05749fd68dadc316af46bd7d49931821950cbeb037c7d19f7d66_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:676693e80ea746f3e6382a0cd81b21c77c3922cafa74ec3a349b89943d59f2ee_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:a2d150f31c8e11e4d0cc651d8a58212f769d00b453e6a7efcc68ca5cca63878d_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c8348d21a8cecefea08d43a4bcd4898bc086ce91ccd60a2e9c31bbb13e5511c7_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:c87072639a6a332398c6681de4f18578c4778f33117e25be63fca278bb94ab2b_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/apache/thrift: Apache Thrift: Integer Overflow in TFramedTransport Go implementation"
}
]
}
RHSA-2026:14885
Vulnerability from csaf_redhat - Published: 2026-05-07 16:23 - Updated: 2026-05-07 16:26A flaw was found in the Apache Thrift TFramedTransport Go language implementation. This integer overflow or wraparound vulnerability could potentially allow an attacker to cause unexpected behavior or resource exhaustion, leading to a denial of service.
A flaw was found in Apache Thrift. This vulnerability involves improper validation of server certificates, where the hostname presented in the certificate does not match the expected hostname. A remote attacker could exploit this to impersonate a legitimate server, potentially intercepting or altering sensitive communications and leading to unauthorized access or information disclosure.
A flaw was found in Apache Thrift. This out-of-bounds read vulnerability could allow an attacker to access memory outside of allocated bounds. This could lead to information disclosure or potentially a denial of service (DoS) condition.
A flaw was found in Apache Thrift. This integer overflow or wraparound vulnerability could potentially lead to unexpected behavior or resource exhaustion, which may impact the availability or integrity of the system. The exact consequences depend on how the overflow is triggered and handled within the application.
A flaw was found in Apache Thrift. An uncontrolled recursion vulnerability exists, which could allow a remote attacker to trigger a Denial of Service (DoS) condition. This occurs when the affected component processes specially crafted input, leading to excessive resource consumption and system unavailability.
A flaw was found in Apache Thrift. This out-of-bounds read vulnerability can lead to the disclosure of sensitive information or a denial of service.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift distributed tracing platform (Tempo) 3.9.3 has been released",
"title": "Topic"
},
{
"category": "general",
"text": "This release of the Red Hat OpenShift distributed tracing platform (Tempo) provides security improvements and bug fixes.\n\n\nBreaking changes:\n\n* None.\n\n\nDeprecations:\n\n* None.\n\n\nTechnology Preview features:\n\n* None.\n\n\nEnhancements:\n\n* None.\n\n\nBug fixes:\n\n* Apache Thrift TFramedTransport integer overflow vulnerability is fixed: Previously, the Apache Thrift TFramedTransport Go language implementation contained an integer overflow vulnerability. An attacker could exploit this wraparound flaw to cause unexpected behavior or resource exhaustion, leading to a denial of service. With this update, the integer overflow vulnerability is fixed. For more information, see https://access.redhat.com/security/cve/cve-2026-41602.\n\n* Apache Thrift server certificate validation vulnerability is fixed: Previously, Apache Thrift did not properly validate server certificates. Apache Thrift accepted certificates even when the hostname did not match the expected hostname. A remote attacker could exploit this flaw to impersonate a legitimate server, intercept or alter sensitive communications, and gain unauthorized access or disclose information. With this update, Apache Thrift properly validates server certificate hostnames. For more information, see https://access.redhat.com/security/cve/cve-2026-41603.\n\n* Apache Thrift out-of-bounds read vulnerability is fixed: Previously, Apache Thrift contained an out-of-bounds read vulnerability. An attacker could exploit this flaw to access memory outside of allocated bounds, resulting in information disclosure or a denial-of-service (DoS) condition. With this update, Apache Thrift correctly validates memory access boundaries. For more information, see https://access.redhat.com/security/cve/cve-2026-41604 and https://access.redhat.com/security/cve/cve-2026-41607.\n\n* Apache Thrift integer overflow vulnerability is fixed: Previously, Apache Thrift contained an integer overflow vulnerability. An attacker could exploit this wraparound flaw to cause unexpected behavior or resource exhaustion, impacting system availability or integrity. With this update, Apache Thrift correctly handles integer operations to prevent overflow conditions. For more information, see https://access.redhat.com/security/cve/cve-2026-41605.\n\n* Apache Thrift uncontrolled recursion vulnerability is fixed: Previously, Apache Thrift contained an uncontrolled recursion vulnerability. When Apache Thrift processed specially crafted input, a remote attacker could trigger a denial-of-service (DoS) condition, causing excessive resource consumption and system unavailability. With this update, the recursion vulnerability is fixed, and remote attackers can no longer exploit this flaw. For more information, see https://access.redhat.com/security/cve/cve-2026-41606.\n\n\nKnown issues:\n\n* None.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:14885",
"url": "https://access.redhat.com/errata/RHSA-2026:14885"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-41602",
"url": "https://access.redhat.com/security/cve/CVE-2026-41602"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-41603",
"url": "https://access.redhat.com/security/cve/CVE-2026-41603"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-41604",
"url": "https://access.redhat.com/security/cve/CVE-2026-41604"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-41605",
"url": "https://access.redhat.com/security/cve/CVE-2026-41605"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-41606",
"url": "https://access.redhat.com/security/cve/CVE-2026-41606"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-41607",
"url": "https://access.redhat.com/security/cve/CVE-2026-41607"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_14885.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.3 release",
"tracking": {
"current_release_date": "2026-05-07T16:26:17+00:00",
"generator": {
"date": "2026-05-07T16:26:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:14885",
"initial_release_date": "2026-05-07T16:23:20+00:00",
"revision_history": [
{
"date": "2026-05-07T16:23:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-07T16:23:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-07T16:26:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 3.9.3",
"product": {
"name": "Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.9::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256%3A9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778160493"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778156610"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3Af6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3A37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158323"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3Ae2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158321"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158343"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158374"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3Ad1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778156610"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3Abea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3A20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158323"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3Aa12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158321"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3Ad7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158343"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158374"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3Ae78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778156610"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3Ad21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3A94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158323"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3A815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158321"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158343"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3Acb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158374"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778156610"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3Acf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158391"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3A3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158323"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3A0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158321"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158343"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3Af9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1778158374"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x as a component of Red Hat OpenShift distributed tracing 3.9.3",
"product_id": "Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-41602",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2026-04-28T10:01:16.099816+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2463407"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Apache Thrift TFramedTransport Go language implementation. This integer overflow or wraparound vulnerability could potentially allow an attacker to cause unexpected behavior or resource exhaustion, leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/apache/thrift: Apache Thrift: Integer Overflow in TFramedTransport Go implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-41602"
},
{
"category": "external",
"summary": "RHBZ#2463407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2463407"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-41602",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41602"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-41602",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41602"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/04/28/6",
"url": "http://www.openwall.com/lists/oss-security/2026/04/28/6"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql",
"url": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql"
}
],
"release_date": "2026-04-28T09:19:06.646000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-07T16:23:20+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:14885"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/apache/thrift: Apache Thrift: Integer Overflow in TFramedTransport Go implementation"
},
{
"cve": "CVE-2026-41603",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2026-04-28T10:01:29.782287+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2463411"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Thrift. This vulnerability involves improper validation of server certificates, where the hostname presented in the certificate does not match the expected hostname. A remote attacker could exploit this to impersonate a legitimate server, potentially intercepting or altering sensitive communications and leading to unauthorized access or information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Thrift: apache.com/apache/thrift: Apache Thrift: Security Bypass via Improper Certificate Hostname Validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-41603"
},
{
"category": "external",
"summary": "RHBZ#2463411",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2463411"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-41603",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41603"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-41603",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41603"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/04/28/7",
"url": "http://www.openwall.com/lists/oss-security/2026/04/28/7"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql",
"url": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql"
}
],
"release_date": "2026-04-28T09:19:40.564000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-07T16:23:20+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:14885"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Apache Thrift: apache.com/apache/thrift: Apache Thrift: Security Bypass via Improper Certificate Hostname Validation"
},
{
"cve": "CVE-2026-41604",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2026-04-28T10:01:47.903741+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2463416"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Thrift. This out-of-bounds read vulnerability could allow an attacker to access memory outside of allocated bounds. This could lead to information disclosure or potentially a denial of service (DoS) condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Thrift: apache.com/apache/thrift: Apache Thrift: Out-of-bounds Read vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-41604"
},
{
"category": "external",
"summary": "RHBZ#2463416",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2463416"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-41604",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41604"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-41604",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41604"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/04/28/5",
"url": "http://www.openwall.com/lists/oss-security/2026/04/28/5"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql",
"url": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql"
}
],
"release_date": "2026-04-28T09:20:13.996000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-07T16:23:20+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:14885"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Apache Thrift: apache.com/apache/thrift: Apache Thrift: Out-of-bounds Read vulnerability"
},
{
"cve": "CVE-2026-41605",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2026-04-28T10:01:54.269412+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2463418"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Thrift. This integer overflow or wraparound vulnerability could potentially lead to unexpected behavior or resource exhaustion, which may impact the availability or integrity of the system. The exact consequences depend on how the overflow is triggered and handled within the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Thrift: Apache Thrift: Integer Overflow or Wraparound Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-41605"
},
{
"category": "external",
"summary": "RHBZ#2463418",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2463418"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-41605",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41605"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-41605",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41605"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/04/28/4",
"url": "http://www.openwall.com/lists/oss-security/2026/04/28/4"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql",
"url": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql"
}
],
"release_date": "2026-04-28T09:20:44.319000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-07T16:23:20+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:14885"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Apache Thrift: Apache Thrift: Integer Overflow or Wraparound Vulnerability"
},
{
"cve": "CVE-2026-41606",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"discovery_date": "2026-04-28T10:01:19.136351+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2463408"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Thrift. An uncontrolled recursion vulnerability exists, which could allow a remote attacker to trigger a Denial of Service (DoS) condition. This occurs when the affected component processes specially crafted input, leading to excessive resource consumption and system unavailability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Thrift: Apache Thrift: Denial of Service via uncontrolled recursion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-41606"
},
{
"category": "external",
"summary": "RHBZ#2463408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2463408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-41606",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41606"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-41606",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41606"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/04/28/3",
"url": "http://www.openwall.com/lists/oss-security/2026/04/28/3"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql",
"url": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql"
}
],
"release_date": "2026-04-28T09:21:12.815000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-07T16:23:20+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:14885"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Apache Thrift: Apache Thrift: Denial of Service via uncontrolled recursion"
},
{
"cve": "CVE-2026-41607",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2026-04-28T10:01:33.022623+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2463412"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Thrift. This out-of-bounds read vulnerability can lead to the disclosure of sensitive information or a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache Thrift: apache.com/apache/thrift: Apache Thrift: Out-of-bounds Read vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-41607"
},
{
"category": "external",
"summary": "RHBZ#2463412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2463412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-41607",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41607"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-41607",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41607"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/04/28/2",
"url": "http://www.openwall.com/lists/oss-security/2026/04/28/2"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql",
"url": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql"
}
],
"release_date": "2026-04-28T09:21:48.502000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-07T16:23:20+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:14885"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b_s390x",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e_arm64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01_amd64",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.3:registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Apache Thrift: apache.com/apache/thrift: Apache Thrift: Out-of-bounds Read vulnerability"
}
]
}
OPENSUSE-SU-2026:10685-1
Vulnerability from csaf_opensuse - Published: 2026-05-04 00:00 - Updated: 2026-05-04 00:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libthrift-0_23_0-0.23.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libthrift-0_23_0-0.23.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10685",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10685-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-41602 page",
"url": "https://www.suse.com/security/cve/CVE-2026-41602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-41604 page",
"url": "https://www.suse.com/security/cve/CVE-2026-41604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-41605 page",
"url": "https://www.suse.com/security/cve/CVE-2026-41605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-41606 page",
"url": "https://www.suse.com/security/cve/CVE-2026-41606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-41607 page",
"url": "https://www.suse.com/security/cve/CVE-2026-41607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-41636 page",
"url": "https://www.suse.com/security/cve/CVE-2026-41636/"
}
],
"title": "libthrift-0_23_0-0.23.0-1.1 on GA media",
"tracking": {
"current_release_date": "2026-05-04T00:00:00Z",
"generator": {
"date": "2026-05-04T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10685-1",
"initial_release_date": "2026-05-04T00:00:00Z",
"revision_history": [
{
"date": "2026-05-04T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libthrift-0_23_0-0.23.0-1.1.aarch64",
"product": {
"name": "libthrift-0_23_0-0.23.0-1.1.aarch64",
"product_id": "libthrift-0_23_0-0.23.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libthrift-devel-0.23.0-1.1.aarch64",
"product": {
"name": "libthrift-devel-0.23.0-1.1.aarch64",
"product_id": "libthrift-devel-0.23.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libthrift_c_glib0-0.23.0-1.1.aarch64",
"product": {
"name": "libthrift_c_glib0-0.23.0-1.1.aarch64",
"product_id": "libthrift_c_glib0-0.23.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"product": {
"name": "libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"product_id": "libthriftnb-0_23_0-0.23.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libthriftz-0_23_0-0.23.0-1.1.aarch64",
"product": {
"name": "libthriftz-0_23_0-0.23.0-1.1.aarch64",
"product_id": "libthriftz-0_23_0-0.23.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-thrift-0.23.0-1.1.aarch64",
"product": {
"name": "perl-thrift-0.23.0-1.1.aarch64",
"product_id": "perl-thrift-0.23.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-thrift-0.23.0-1.1.aarch64",
"product": {
"name": "python311-thrift-0.23.0-1.1.aarch64",
"product_id": "python311-thrift-0.23.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-thrift-0.23.0-1.1.aarch64",
"product": {
"name": "python313-thrift-0.23.0-1.1.aarch64",
"product_id": "python313-thrift-0.23.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python314-thrift-0.23.0-1.1.aarch64",
"product": {
"name": "python314-thrift-0.23.0-1.1.aarch64",
"product_id": "python314-thrift-0.23.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "thrift-0.23.0-1.1.aarch64",
"product": {
"name": "thrift-0.23.0-1.1.aarch64",
"product_id": "thrift-0.23.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libthrift-0_23_0-0.23.0-1.1.ppc64le",
"product": {
"name": "libthrift-0_23_0-0.23.0-1.1.ppc64le",
"product_id": "libthrift-0_23_0-0.23.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libthrift-devel-0.23.0-1.1.ppc64le",
"product": {
"name": "libthrift-devel-0.23.0-1.1.ppc64le",
"product_id": "libthrift-devel-0.23.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libthrift_c_glib0-0.23.0-1.1.ppc64le",
"product": {
"name": "libthrift_c_glib0-0.23.0-1.1.ppc64le",
"product_id": "libthrift_c_glib0-0.23.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"product": {
"name": "libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"product_id": "libthriftnb-0_23_0-0.23.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"product": {
"name": "libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"product_id": "libthriftz-0_23_0-0.23.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-thrift-0.23.0-1.1.ppc64le",
"product": {
"name": "perl-thrift-0.23.0-1.1.ppc64le",
"product_id": "perl-thrift-0.23.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-thrift-0.23.0-1.1.ppc64le",
"product": {
"name": "python311-thrift-0.23.0-1.1.ppc64le",
"product_id": "python311-thrift-0.23.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-thrift-0.23.0-1.1.ppc64le",
"product": {
"name": "python313-thrift-0.23.0-1.1.ppc64le",
"product_id": "python313-thrift-0.23.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python314-thrift-0.23.0-1.1.ppc64le",
"product": {
"name": "python314-thrift-0.23.0-1.1.ppc64le",
"product_id": "python314-thrift-0.23.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "thrift-0.23.0-1.1.ppc64le",
"product": {
"name": "thrift-0.23.0-1.1.ppc64le",
"product_id": "thrift-0.23.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libthrift-0_23_0-0.23.0-1.1.s390x",
"product": {
"name": "libthrift-0_23_0-0.23.0-1.1.s390x",
"product_id": "libthrift-0_23_0-0.23.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libthrift-devel-0.23.0-1.1.s390x",
"product": {
"name": "libthrift-devel-0.23.0-1.1.s390x",
"product_id": "libthrift-devel-0.23.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libthrift_c_glib0-0.23.0-1.1.s390x",
"product": {
"name": "libthrift_c_glib0-0.23.0-1.1.s390x",
"product_id": "libthrift_c_glib0-0.23.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libthriftnb-0_23_0-0.23.0-1.1.s390x",
"product": {
"name": "libthriftnb-0_23_0-0.23.0-1.1.s390x",
"product_id": "libthriftnb-0_23_0-0.23.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libthriftz-0_23_0-0.23.0-1.1.s390x",
"product": {
"name": "libthriftz-0_23_0-0.23.0-1.1.s390x",
"product_id": "libthriftz-0_23_0-0.23.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-thrift-0.23.0-1.1.s390x",
"product": {
"name": "perl-thrift-0.23.0-1.1.s390x",
"product_id": "perl-thrift-0.23.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-thrift-0.23.0-1.1.s390x",
"product": {
"name": "python311-thrift-0.23.0-1.1.s390x",
"product_id": "python311-thrift-0.23.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-thrift-0.23.0-1.1.s390x",
"product": {
"name": "python313-thrift-0.23.0-1.1.s390x",
"product_id": "python313-thrift-0.23.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python314-thrift-0.23.0-1.1.s390x",
"product": {
"name": "python314-thrift-0.23.0-1.1.s390x",
"product_id": "python314-thrift-0.23.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "thrift-0.23.0-1.1.s390x",
"product": {
"name": "thrift-0.23.0-1.1.s390x",
"product_id": "thrift-0.23.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libthrift-0_23_0-0.23.0-1.1.x86_64",
"product": {
"name": "libthrift-0_23_0-0.23.0-1.1.x86_64",
"product_id": "libthrift-0_23_0-0.23.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libthrift-devel-0.23.0-1.1.x86_64",
"product": {
"name": "libthrift-devel-0.23.0-1.1.x86_64",
"product_id": "libthrift-devel-0.23.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libthrift_c_glib0-0.23.0-1.1.x86_64",
"product": {
"name": "libthrift_c_glib0-0.23.0-1.1.x86_64",
"product_id": "libthrift_c_glib0-0.23.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"product": {
"name": "libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"product_id": "libthriftnb-0_23_0-0.23.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libthriftz-0_23_0-0.23.0-1.1.x86_64",
"product": {
"name": "libthriftz-0_23_0-0.23.0-1.1.x86_64",
"product_id": "libthriftz-0_23_0-0.23.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-thrift-0.23.0-1.1.x86_64",
"product": {
"name": "perl-thrift-0.23.0-1.1.x86_64",
"product_id": "perl-thrift-0.23.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-thrift-0.23.0-1.1.x86_64",
"product": {
"name": "python311-thrift-0.23.0-1.1.x86_64",
"product_id": "python311-thrift-0.23.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-thrift-0.23.0-1.1.x86_64",
"product": {
"name": "python313-thrift-0.23.0-1.1.x86_64",
"product_id": "python313-thrift-0.23.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python314-thrift-0.23.0-1.1.x86_64",
"product": {
"name": "python314-thrift-0.23.0-1.1.x86_64",
"product_id": "python314-thrift-0.23.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "thrift-0.23.0-1.1.x86_64",
"product": {
"name": "thrift-0.23.0-1.1.x86_64",
"product_id": "thrift-0.23.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libthrift-0_23_0-0.23.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64"
},
"product_reference": "libthrift-0_23_0-0.23.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthrift-0_23_0-0.23.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le"
},
"product_reference": "libthrift-0_23_0-0.23.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthrift-0_23_0-0.23.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x"
},
"product_reference": "libthrift-0_23_0-0.23.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthrift-0_23_0-0.23.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64"
},
"product_reference": "libthrift-0_23_0-0.23.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthrift-devel-0.23.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64"
},
"product_reference": "libthrift-devel-0.23.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthrift-devel-0.23.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le"
},
"product_reference": "libthrift-devel-0.23.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthrift-devel-0.23.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x"
},
"product_reference": "libthrift-devel-0.23.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthrift-devel-0.23.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64"
},
"product_reference": "libthrift-devel-0.23.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthrift_c_glib0-0.23.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64"
},
"product_reference": "libthrift_c_glib0-0.23.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthrift_c_glib0-0.23.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le"
},
"product_reference": "libthrift_c_glib0-0.23.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthrift_c_glib0-0.23.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x"
},
"product_reference": "libthrift_c_glib0-0.23.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthrift_c_glib0-0.23.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64"
},
"product_reference": "libthrift_c_glib0-0.23.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthriftnb-0_23_0-0.23.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64"
},
"product_reference": "libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthriftnb-0_23_0-0.23.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le"
},
"product_reference": "libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthriftnb-0_23_0-0.23.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x"
},
"product_reference": "libthriftnb-0_23_0-0.23.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthriftnb-0_23_0-0.23.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64"
},
"product_reference": "libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthriftz-0_23_0-0.23.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64"
},
"product_reference": "libthriftz-0_23_0-0.23.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthriftz-0_23_0-0.23.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le"
},
"product_reference": "libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthriftz-0_23_0-0.23.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x"
},
"product_reference": "libthriftz-0_23_0-0.23.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libthriftz-0_23_0-0.23.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64"
},
"product_reference": "libthriftz-0_23_0-0.23.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-thrift-0.23.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64"
},
"product_reference": "perl-thrift-0.23.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-thrift-0.23.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le"
},
"product_reference": "perl-thrift-0.23.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-thrift-0.23.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x"
},
"product_reference": "perl-thrift-0.23.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-thrift-0.23.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64"
},
"product_reference": "perl-thrift-0.23.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-thrift-0.23.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64"
},
"product_reference": "python311-thrift-0.23.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-thrift-0.23.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le"
},
"product_reference": "python311-thrift-0.23.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-thrift-0.23.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x"
},
"product_reference": "python311-thrift-0.23.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-thrift-0.23.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64"
},
"product_reference": "python311-thrift-0.23.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-thrift-0.23.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64"
},
"product_reference": "python313-thrift-0.23.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-thrift-0.23.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le"
},
"product_reference": "python313-thrift-0.23.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-thrift-0.23.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x"
},
"product_reference": "python313-thrift-0.23.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-thrift-0.23.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64"
},
"product_reference": "python313-thrift-0.23.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-thrift-0.23.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64"
},
"product_reference": "python314-thrift-0.23.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-thrift-0.23.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le"
},
"product_reference": "python314-thrift-0.23.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-thrift-0.23.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x"
},
"product_reference": "python314-thrift-0.23.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-thrift-0.23.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64"
},
"product_reference": "python314-thrift-0.23.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thrift-0.23.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64"
},
"product_reference": "thrift-0.23.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thrift-0.23.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le"
},
"product_reference": "thrift-0.23.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thrift-0.23.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x"
},
"product_reference": "thrift-0.23.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thrift-0.23.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
},
"product_reference": "thrift-0.23.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-41602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-41602"
}
],
"notes": [
{
"category": "general",
"text": "Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation\n\nThis issue affects Apache Thrift: before 0.23.0.\n\nUsers are recommended to upgrade to version 0.23.0, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-41602",
"url": "https://www.suse.com/security/cve/CVE-2026-41602"
},
{
"category": "external",
"summary": "SUSE Bug 1263496 for CVE-2026-41602",
"url": "https://bugzilla.suse.com/1263496"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-41602"
},
{
"cve": "CVE-2026-41604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-41604"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read vulnerability in Apache Thrift.\n\nThis issue affects Apache Thrift: before 0.23.0.\n\nUsers are recommended to upgrade to version 0.23.0, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-41604",
"url": "https://www.suse.com/security/cve/CVE-2026-41604"
},
{
"category": "external",
"summary": "SUSE Bug 1263444 for CVE-2026-41604",
"url": "https://bugzilla.suse.com/1263444"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-41604"
},
{
"cve": "CVE-2026-41605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-41605"
}
],
"notes": [
{
"category": "general",
"text": "Integer Overflow or Wraparound vulnerability in Apache Thrift.\n\nThis issue affects Apache Thrift: before 0.23.0.\n\nUsers are recommended to upgrade to version 0.23.0, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-41605",
"url": "https://www.suse.com/security/cve/CVE-2026-41605"
},
{
"category": "external",
"summary": "SUSE Bug 1263368 for CVE-2026-41605",
"url": "https://bugzilla.suse.com/1263368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-41605"
},
{
"cve": "CVE-2026-41606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-41606"
}
],
"notes": [
{
"category": "general",
"text": "Uncontrolled Recursion vulnerability in Apache Thrift.\n\nThis issue affects Apache Thrift: before 0.23.0.\n\nUsers are recommended to upgrade to version 0.23.0, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-41606",
"url": "https://www.suse.com/security/cve/CVE-2026-41606"
},
{
"category": "external",
"summary": "SUSE Bug 1263323 for CVE-2026-41606",
"url": "https://bugzilla.suse.com/1263323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-41606"
},
{
"cve": "CVE-2026-41607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-41607"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read vulnerability in Apache Thrift.\n\nThis issue affects Apache Thrift: before 0.23.0.\n\nUsers are recommended to upgrade to version 0.23.0, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-41607",
"url": "https://www.suse.com/security/cve/CVE-2026-41607"
},
{
"category": "external",
"summary": "SUSE Bug 1263256 for CVE-2026-41607",
"url": "https://bugzilla.suse.com/1263256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-41607"
},
{
"cve": "CVE-2026-41636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-41636"
}
],
"notes": [
{
"category": "general",
"text": "Uncontrolled Recursion vulnerability in Apache Thrift Node.js bindings\n\nThis issue affects Apache Thrift: before 0.23.0.\n\nUsers are recommended to upgrade to version 0.23.0, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-41636",
"url": "https://www.suse.com/security/cve/CVE-2026-41636"
},
{
"category": "external",
"summary": "SUSE Bug 1263185 for CVE-2026-41636",
"url": "https://bugzilla.suse.com/1263185"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift-devel-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthrift_c_glib0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftnb-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:libthriftz-0_23_0-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:perl-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python311-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python313-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:python314-thrift-0.23.0-1.1.x86_64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.aarch64",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.ppc64le",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.s390x",
"openSUSE Tumbleweed:thrift-0.23.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-41636"
}
]
}
OPENSUSE-SU-2026:10699-1
Vulnerability from csaf_opensuse - Published: 2026-05-06 00:00 - Updated: 2026-05-06 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "amazon-cloudwatch-agent-1.300066.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the amazon-cloudwatch-agent-1.300066.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10699",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10699-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-41602 page",
"url": "https://www.suse.com/security/cve/CVE-2026-41602/"
}
],
"title": "amazon-cloudwatch-agent-1.300066.1-1.1 on GA media",
"tracking": {
"current_release_date": "2026-05-06T00:00:00Z",
"generator": {
"date": "2026-05-06T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10699-1",
"initial_release_date": "2026-05-06T00:00:00Z",
"revision_history": [
{
"date": "2026-05-06T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "amazon-cloudwatch-agent-1.300066.1-1.1.aarch64",
"product": {
"name": "amazon-cloudwatch-agent-1.300066.1-1.1.aarch64",
"product_id": "amazon-cloudwatch-agent-1.300066.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "amazon-cloudwatch-agent-1.300066.1-1.1.ppc64le",
"product": {
"name": "amazon-cloudwatch-agent-1.300066.1-1.1.ppc64le",
"product_id": "amazon-cloudwatch-agent-1.300066.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "amazon-cloudwatch-agent-1.300066.1-1.1.s390x",
"product": {
"name": "amazon-cloudwatch-agent-1.300066.1-1.1.s390x",
"product_id": "amazon-cloudwatch-agent-1.300066.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "amazon-cloudwatch-agent-1.300066.1-1.1.x86_64",
"product": {
"name": "amazon-cloudwatch-agent-1.300066.1-1.1.x86_64",
"product_id": "amazon-cloudwatch-agent-1.300066.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-cloudwatch-agent-1.300066.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.aarch64"
},
"product_reference": "amazon-cloudwatch-agent-1.300066.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-cloudwatch-agent-1.300066.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.ppc64le"
},
"product_reference": "amazon-cloudwatch-agent-1.300066.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-cloudwatch-agent-1.300066.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.s390x"
},
"product_reference": "amazon-cloudwatch-agent-1.300066.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "amazon-cloudwatch-agent-1.300066.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.x86_64"
},
"product_reference": "amazon-cloudwatch-agent-1.300066.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-41602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-41602"
}
],
"notes": [
{
"category": "general",
"text": "Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation\n\nThis issue affects Apache Thrift: before 0.23.0.\n\nUsers are recommended to upgrade to version 0.23.0, which fixes the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.aarch64",
"openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.ppc64le",
"openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.s390x",
"openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-41602",
"url": "https://www.suse.com/security/cve/CVE-2026-41602"
},
{
"category": "external",
"summary": "SUSE Bug 1263496 for CVE-2026-41602",
"url": "https://bugzilla.suse.com/1263496"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.aarch64",
"openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.ppc64le",
"openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.s390x",
"openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.aarch64",
"openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.ppc64le",
"openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.s390x",
"openSUSE Tumbleweed:amazon-cloudwatch-agent-1.300066.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-06T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-41602"
}
]
}
MSRC_CVE-2026-41602
Vulnerability from csaf_microsoft - Published: 2026-04-02 00:00 - Updated: 2026-05-01 01:03| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41602 Apache Thrift: Go TFramedTransport uint32 overflow - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-41602.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Apache Thrift: Go TFramedTransport uint32 overflow",
"tracking": {
"current_release_date": "2026-05-01T01:03:27.000Z",
"generator": {
"date": "2026-05-01T07:34:33.891Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-41602",
"initial_release_date": "2026-04-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-04-30T01:11:04.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-05-01T01:03:27.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 influxdb 0:2.7.5-15.azl3",
"product": {
"name": "azl3 influxdb 0:2.7.5-15.azl3",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "influxdb"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 kata-containers 0:3.19.1.kata3-1.azl3",
"product": {
"name": "azl3 kata-containers 0:3.19.1.kata3-1.azl3",
"product_id": "1"
}
},
{
"category": "product_version_range",
"name": "cbl2 kata-containers 0:3.2.0.azl2-7.cbl2",
"product": {
"name": "cbl2 kata-containers 0:3.2.0.azl2-7.cbl2",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "kata-containers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 kata-containers-cc 0:3.2.0.azl2-8.cbl2",
"product": {
"name": "cbl2 kata-containers-cc 0:3.2.0.azl2-8.cbl2",
"product_id": "7"
}
},
{
"category": "product_version_range",
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-9.azl3",
"product": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-9.azl3",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "kata-containers-cc"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 telegraf 0:1.31.0-19.azl3",
"product": {
"name": "azl3 telegraf 0:1.31.0-19.azl3",
"product_id": "3"
}
},
{
"category": "product_version_range",
"name": "cbl2 telegraf 0:1.29.4-22.cbl2",
"product": {
"name": "cbl2 telegraf 0:1.29.4-22.cbl2",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "telegraf"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 thrift 0:0.15.0-5.azl3",
"product": {
"name": "azl3 thrift 0:0.15.0-5.azl3",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "thrift"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 ceph 0:16.2.10-11.cbl2",
"product": {
"name": "cbl2 ceph 0:16.2.10-11.cbl2",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "ceph"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 influxdb 0:2.7.5-15.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kata-containers 0:3.19.1.kata3-1.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kata-containers-cc 0:3.2.0.azl2-8.cbl2 as a component of CBL Mariner 2.0",
"product_id": "17086-7"
},
"product_reference": "7",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 telegraf 0:1.31.0-19.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 thrift 0:0.15.0-5.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-9"
},
"product_reference": "9",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-9.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 ceph 0:16.2.10-11.cbl2 as a component of CBL Mariner 2.0",
"product_id": "17086-6"
},
"product_reference": "6",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kata-containers 0:3.2.0.azl2-7.cbl2 as a component of CBL Mariner 2.0",
"product_id": "17086-8"
},
"product_reference": "8",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 telegraf 0:1.29.4-22.cbl2 as a component of CBL Mariner 2.0",
"product_id": "17086-5"
},
"product_reference": "5",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-41602",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "general",
"text": "apache",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17084-2",
"17084-1",
"17086-7",
"17084-3",
"17084-9",
"17084-4",
"17086-6",
"17086-8",
"17086-5"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41602 Apache Thrift: Go TFramedTransport uint32 overflow - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-41602.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-04-30T01:11:04.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-2"
]
},
{
"category": "none_available",
"date": "2026-04-30T01:11:04.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-1"
]
},
{
"category": "none_available",
"date": "2026-04-30T01:11:04.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-7"
]
},
{
"category": "none_available",
"date": "2026-04-30T01:11:04.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-3"
]
},
{
"category": "none_available",
"date": "2026-04-30T01:11:04.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-9"
]
},
{
"category": "none_available",
"date": "2026-04-30T01:11:04.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-4"
]
},
{
"category": "none_available",
"date": "2026-04-30T01:11:04.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-6"
]
},
{
"category": "none_available",
"date": "2026-04-30T01:11:04.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-8"
]
},
{
"category": "none_available",
"date": "2026-04-30T01:11:04.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-5"
]
}
],
"title": "Apache Thrift: Go TFramedTransport uint32 overflow"
}
]
}
FKIE_CVE-2026-41602
Vulnerability from fkie_nvd - Published: 2026-04-28 10:16 - Updated: 2026-04-28 18:40| URL | Tags | ||
|---|---|---|---|
| security@apache.org | https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql | Mailing List, Patch, Release Notes | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2026/04/28/6 | Mailing List |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:thrift:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CE7604A-DA43-44E3-9840-9E3696223DD5",
"versionEndExcluding": "0.23.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation\n\nThis issue affects Apache Thrift: before 0.23.0.\n\nUsers are recommended to upgrade to version 0.23.0, which fixes the issue."
}
],
"id": "CVE-2026-41602",
"lastModified": "2026-04-28T18:40:25.530",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-04-28T10:16:03.000",
"references": [
{
"source": "security@apache.org",
"tags": [
"Mailing List",
"Patch",
"Release Notes"
],
"url": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2026/04/28/6"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "security@apache.org",
"type": "Secondary"
}
]
}
GHSA-WF45-Q9CH-Q8GH
Vulnerability from github – Published: 2026-04-28 12:31 – Updated: 2026-05-06 19:57Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation
This issue affects Apache Thrift: before 0.23.0.
Users are recommended to upgrade to version 0.23.0, which fixes the issue.
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/apache/thrift"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.23.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-41602"
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"github_reviewed": true,
"github_reviewed_at": "2026-05-06T19:57:08Z",
"nvd_published_at": "2026-04-28T10:16:03Z",
"severity": "HIGH"
},
"details": "Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation\n\nThis issue affects Apache Thrift: before 0.23.0.\n\nUsers are recommended to upgrade to version 0.23.0, which fixes the issue.",
"id": "GHSA-wf45-q9ch-q8gh",
"modified": "2026-05-06T19:57:09Z",
"published": "2026-04-28T12:31:30Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41602"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/thrift"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/04/28/6"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Apache Thrift TFramedTransport Go language implementation has an Integer Overflow or Wraparound vulnerability"
}
bit-thrift-2026-41602
Vulnerability from bitnami_vulndb
Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation
This issue affects Apache Thrift: before 0.23.0.
Users are recommended to upgrade to version 0.23.0, which fixes the issue.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "thrift",
"purl": "pkg:bitnami/thrift"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.23.0"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2026-41602"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:apache:thrift:*:*:*:*:*:*:*:*"
],
"severity": "High"
},
"details": "Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation\n\nThis issue affects Apache Thrift: before 0.23.0.\n\nUsers are recommended to upgrade to version 0.23.0, which fixes the issue.",
"id": "BIT-thrift-2026-41602",
"modified": "2026-04-29T09:10:02.628Z",
"published": "2026-04-29T08:50:18.674Z",
"references": [
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/04/28/6"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/lb4j0zyd5f3g36cos0wql925przpnwql"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41602"
}
],
"schema_version": "1.6.2",
"summary": "Apache Thrift: Go TFramedTransport uint32 overflow"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.