- Issued:
- 2026-02-26
- Updated:
- 2026-02-26
RHSA-2026:3427 - Security Advisory
Synopsis
Red Hat build of OpenTelemetry 3.9.0 release
Type/Severity
Security Advisory: Important
Topic
Red Hat build of OpenTelemetry 3.9.0 has been released
Description
This release of the Red Hat build of OpenTelemetry provides new features, security improvements, and bug fixes.
Breaking changes:
- The deprecated OpenCensus Receiver, which provided backward compatibility with the OpenCensus project for easier migration of instrumented codebases, is removed and is no longer supported. You can use the OpenTelemetry Protocol (OTLP) and OTLP Receiver instead.
Deprecations:
- The `otlp` name for the OTLP gRPC Exporter in the OpenTelemetry Collector custom resource (CR) is deprecated. Use the `otlp_grpc` name instead. The `otlp` name will be removed in a future release.
- The `otlphttp` name for the OTLP HTTP Exporter in the OpenTelemetry Collector custom resource (CR) is deprecated. Use the `otlp_http` name instead. The `otlphttp` name will be removed in a future release.
Technology Preview features:
- Nothing
Enhancements:
- The following components, available as a Technology Preview before this update, are fully supported from version 3.9:
- Target Allocator
- Prometheus Exporter
- Prometheus Remote Write Exporter
- Filter Processor
- Transform Processor
- Kubernetes Events Receiver
- This update introduces the Metric Start Time Processor. You can use it to add start times to cumulative metrics after the Prometheus Receiver and benefit as follows: Improve historical data analysis by adding start time data for cumulative values. Enable the back end to accurately calculate request rates per minute. Enable threshold-based alerts.
- This release upgrades the Red Hat Universal Base Image (UBI) to version 9.
- This update adds support for overriding the Operator configuration by using environment variables.
- This update adds support for Prometheus scrape classes in the Target Allocator component.
- This update changes the configuration of the Kafka Receiver and Kafka Exporter in the OpenTelemetry Collector. The top-level encoding field is now deprecated. With this update, you must set encoding per signal type under logs, metrics, and traces. Use the raw encoding for logs only, because setting it at the top level and applied to all signal types causes a startup failure. For examples, see "Kafka Receiver" and "Kafka Exporter" in the Red Hat build of OpenTelemetry documentation (docs.redhat.com/en/documentation/red_hat_build_of_opentelemetry/latest/html-single/configuring_the_collector/index).
Bug fixes:
- Before this update, the NGINX and Apache instrumentation init containers were created by cloning the main container's configuration. As a consequence, there were issues with cloned liveness and readiness probes. With this release, the NGINX and Apache instrumentation init containers are defined independently, rather than inheriting inappropriate probe settings from the main container. As a result, issues with cloned liveness and readiness probes no longer occur.
- Before this update, the ServiceMonitor for the Operator metrics was not created due to a bug. With this release, the ServiceMonitor for the Operator metrics is created. For more information, see https://issues.redhat.com/browse/TRACING-5919.
- CVE-2025-61726: Before this update, a flaw existed in the `net/url` package in the Go standard library. As a consequence, a denial-of-service HTTP request with a massive number of query parameters could cause the application to consume an excessive amount of memory and eventually become unresponsive. This release eliminates this flaw. For more information, see https://access.redhat.com/security/cve/cve-2025-61726.
Known issues:
- The filesystem scraper does not produce the `system.filesystem.inodes.usage` and `system.filesystem.usage` metrics in the Host Metrics Receiver after upgrading from Collector version 0.142.0 to 0.143.0 or later. No known workaround exists. For more information, see https://issues.redhat.com/browse/TRACING-5963.
Solution
For details on how to apply this update, refer to:
Fixes
- TRACING-5919 - [Upstream] [OpenTelemetry] Operator ServiceMonitor not created on OpenShift due to missing args and uppercase scheme value
CVEs
amd64
| registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:299677474d73be959b3b229c7e534c7d1f88aafc5265850c0dcd62874d38a119 |
| registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:f970e31da49e636dcf93d989cae7b4a0c752d0dea05a3f9fcdcf5b2c6ac5f04e |
| registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:35e040b1ef8572a328fdd6ef47080a4ab7283d163692ca512a484532a4baa26d |
| registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:2b20f7c4e45efe3b492822550db1160bc36e9834d684a83f869e45e282c2529a |
arm64
| registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:35e07bd8a1f487a2fcb1f39579d8988a5cd037250a92408e4cf91b14054fa25e |
| registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:a9b078c2d669a38409669a464b5fb5d9003ee8f4d1dd9fce5cbe8f24c1b70ed2 |
| registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:f722ba5871a6c036db161d5ca47c878044e9fe7e31dadcc402c5ed83e5a14b7f |
ppc64le
| registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:aab9d277ecf66ac98e1b582ca559afba360d15bd3695e9b82f4e2975cd94d83e |
| registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:68d386236922cc4111eac7fb59828b611e61e4a01d983f55df26474a670852a3 |
| registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:83f2f6c64882fabaac3075cb2c6b3b5ab53aa45dac6e4d93577221a018c592fa |
s390x
| registry.redhat.io/rhosdt/opentelemetry-collector-rhel9@sha256:7056374735472855598fd8e368b74ce3666e54182549cc54b29abf1927f589f1 |
| registry.redhat.io/rhosdt/opentelemetry-rhel9-operator@sha256:25d378e67f1ca2e0731e9e91b0e5b32e25d7a470ccd4c6e9f053b98561cde692 |
| registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel9@sha256:8e96cd120adaf28b22e8f9ab8028c4c0d3de04a626b9051b5c5c183832c58e80 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.