Memory Allocation with Excessive Size Value vulnerability in Apache Thrift. This issue affects Apache Thrift: before 0.23.0. Users are recommended to upgrade to version 0.23.0, which fixes the issue.
History

Tue, 05 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 05 May 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache thrift
Vendors & Products Apache
Apache thrift

Tue, 05 May 2026 08:30:00 +0000

Type Values Removed Values Added
Description Memory Allocation with Excessive Size Value vulnerability in Apache Thrift. This issue affects Apache Thrift: before 0.23.0. Users are recommended to upgrade to version 0.23.0, which fixes the issue.
Title Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern
Weaknesses CWE-789
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2026-05-05T07:49:47.754Z

Updated: 2026-05-05T19:21:34.278Z

Reserved: 2026-05-04T14:10:22.281Z

Link: CVE-2026-43868

cve-icon Vulnrichment

Updated: 2026-05-05T19:12:21.750Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-05T09:16:04.123

Modified: 2026-05-05T20:16:39.517

Link: CVE-2026-43868

cve-icon Redhat

No data.