- Issued:
- 2026-05-07
- Updated:
- 2026-05-07
RHSA-2026:14885 - Security Advisory
Synopsis
Red Hat OpenShift distributed tracing platform (Tempo) 3.9.3 release
Type/Severity
Security Advisory: Important
Topic
Red Hat OpenShift distributed tracing platform (Tempo) 3.9.3 has been released
Description
This release of the Red Hat OpenShift distributed tracing platform (Tempo) provides security improvements and bug fixes.
Breaking changes:
- None.
Deprecations:
- None.
Technology Preview features:
- None.
Enhancements:
- None.
Bug fixes:
- Apache Thrift TFramedTransport integer overflow vulnerability is fixed: Previously, the Apache Thrift TFramedTransport Go language implementation contained an integer overflow vulnerability. An attacker could exploit this wraparound flaw to cause unexpected behavior or resource exhaustion, leading to a denial of service. With this update, the integer overflow vulnerability is fixed. For more information, see https://access.redhat.com/security/cve/cve-2026-41602.
- Apache Thrift server certificate validation vulnerability is fixed: Previously, Apache Thrift did not properly validate server certificates. Apache Thrift accepted certificates even when the hostname did not match the expected hostname. A remote attacker could exploit this flaw to impersonate a legitimate server, intercept or alter sensitive communications, and gain unauthorized access or disclose information. With this update, Apache Thrift properly validates server certificate hostnames. For more information, see https://access.redhat.com/security/cve/cve-2026-41603.
- Apache Thrift out-of-bounds read vulnerability is fixed: Previously, Apache Thrift contained an out-of-bounds read vulnerability. An attacker could exploit this flaw to access memory outside of allocated bounds, resulting in information disclosure or a denial-of-service (DoS) condition. With this update, Apache Thrift correctly validates memory access boundaries. For more information, see https://access.redhat.com/security/cve/cve-2026-41604 and https://access.redhat.com/security/cve/cve-2026-41607.
- Apache Thrift integer overflow vulnerability is fixed: Previously, Apache Thrift contained an integer overflow vulnerability. An attacker could exploit this wraparound flaw to cause unexpected behavior or resource exhaustion, impacting system availability or integrity. With this update, Apache Thrift correctly handles integer operations to prevent overflow conditions. For more information, see https://access.redhat.com/security/cve/cve-2026-41605.
- Apache Thrift uncontrolled recursion vulnerability is fixed: Previously, Apache Thrift contained an uncontrolled recursion vulnerability. When Apache Thrift processed specially crafted input, a remote attacker could trigger a denial-of-service (DoS) condition, causing excessive resource consumption and system unavailability. With this update, the recursion vulnerability is fixed, and remote attackers can no longer exploit this flaw. For more information, see https://access.redhat.com/security/cve/cve-2026-41606.
Known issues:
- None.
Solution
For details on how to apply this update, refer to:
Fixes
(none)amd64
| registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:9aca25cbc3ab1ba653d3b427df28f2b5ec1c4c041892e5e7ebd817be0ac56017 |
| registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:841e1897e543548f5494c9495463514d4286697a760326b67c11958933a7ac70 |
| registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:f6e5c856ec74d0a7e858448960c4d09d2a24ac7bdce7ff18d1981bd23a45d6cb |
| registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:37069c4ac61fc810096df8c25b1d12f95b04da5f11892fb4c6bcd3a3479d3777 |
| registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:e2c38ca7fa1257940589d6eace9ad5d95c6dbaccf36ae04ce296d0350258e0a0 |
| registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:745c62848b8ab43bbcddf75a79b53662e0ac0aff050281c879e01c4c213accc3 |
| registry.redhat.io/rhosdt/tempo-rhel9@sha256:5f227627f918d7a8b6328843da37547b54271ea93045b9a5d9ede82348b62d01 |
arm64
| registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:d1a3996d3879700be89bad37bb688f5016078a11dbdda894932115da370508ee |
| registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:bea6c0fb2bead67356a76060901018b90c2cda12e5ef0ffca8993e16b761ab41 |
| registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:20951bbce71da848cf595ae1480a0c46b131b59190fd657774a8932889a8e5da |
| registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:a12c6e4a54dfe009700be799c8036a09a8845bc84dea533c024ffac0a65dc491 |
| registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:d7c013a4088c668aacbc00047f00cb1cc0041676f9f8d5a9971ab53fd15d5a69 |
| registry.redhat.io/rhosdt/tempo-rhel9@sha256:3345dc986a756c37e0636877a17dfa8483d12338e67d522419e85667f65cfa3e |
ppc64le
| registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:e78a27a6a17ad3f2bd5771ada6ac2357156cd351dc3e976d0495fcdc38a4d891 |
| registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:d21b8336c12507aabdb03ecee43d5e93633b202ea880ae6aced0426b40d972f6 |
| registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:94fa2f56d060b2ac8a384db29bf073683bef50cd60724e893ee1dcb945424517 |
| registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:815f222ec62bad59caede1682990af6367fcc4354013b5da96a7b67dd311a4b9 |
| registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:50bd4b1c745b916a8127a071e9d79dbde85268ab19c49ffb431863f9222152f6 |
| registry.redhat.io/rhosdt/tempo-rhel9@sha256:cb81f87ad3ed182494ec8f8f4d2a0229a28b716ae27f946d221077961534d9cc |
s390x
| registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:58739fdf7b671103fddd089db340747090d46018435d2f6519fb00436f08684f |
| registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:cf73a80390a85a34b6b95a097a3e00c0ac5ed1e6e0bd396c1f55233b59de70ef |
| registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:3bdaf268da97b95f85a09a18e42e2cfe61ee56b0131b6f86ac4a41fac4854650 |
| registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0fd2089ab716a8733ccdaa909eb7d8663c69de0c87cfc6551ca5a7b93c295a7b |
| registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:5e922a6dc5973688e531cb1bcbb7a9a414f260d64be9c0a66701b7c050f8ed65 |
| registry.redhat.io/rhosdt/tempo-rhel9@sha256:f9a90f6a24678435a08a9783ac7612629b0702633b9405540b02eb5a6da4c6c9 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.