PatchDay Alert
Daily Digest · 2 min read · 5 CVEs · Issue 20 By PatchDay Alert

Apache Thrift 9.4 RCE headlines a quiet five-patch day

A critical unauthenticated bug in Thrift's Node.js server, a Linux kernel USB gadget privesc, curl SMB connection reuse, a Go panic-crash on Windows, and an FRRouting BGP daemon crasher. Nothing exploited in the wild yet.

Patch now
0
Within 24h
2
This week
3
Exploited
0
Azure LinuxLinux KernelLinuxCloudApache ThriftCBL MarinerCephCurlGoGCCTensorFlowTensorBoard

Nothing's on fire, but one of these deserves your attention fast. CVE-2026-43870 is a CVSS 9.4 in Apache Thrift's Node.js server component: remote, unauthenticated, no interaction required. If you expose that anywhere, bump it to the front of your queue. The rest are solid 7.5-7.8 fixes across the Linux kernel, curl, Go on Windows, and FRRouting. No active exploitation on any of them right now.


Today's CVEs

Sorted by urgency

02

CVE-2026-43870

MSRC
9.4
CVSS EPSS 0.03%
Patch within 24h CRITICAL
Apache ThriftAzure LinuxCBL MarinerCephLinuxCloud

Apache Thrift's Node.js web_server.js has multiple vulnerabilities that let a remote, unauthenticated attacker compromise the service. With a CVSS of 9.4, this is near the top of the scale. If you expose Thrift's Node.js server component to the network, treat this as urgent.

Included because
unauthenticated; network-facing; critical CVSS 9.4; multiple platforms affected
Affected estate
Azure Linux 3.0 with thrift 0.15.0-5 and CBL Mariner 2.0 with ceph 16.2.10-11 (which bundles Thrift).
How to check
Run `tdnf list installed thrift` or `tdnf list installed ceph` and compare to the affected versions.
Action
Run `tdnf update thrift` on azl3 and `tdnf update ceph` on cbl2. Restart any services that depend on Thrift's Node.js server.
Urgency
Patch within 24 hours
Why it matters
A CVSS 9.4 unauthenticated remote attack vector against a network service is a fast path to compromise.
Source
Azure Linux advisory

Evidence trail

03

CVE-2026-5773

MSRC
7.5
CVSS EPSS 0.03%
Patch this week HIGH
CurlAzure LinuxLinuxCloud

A bug in curl causes it to incorrectly reuse an existing SMB connection for a different target. An attacker could exploit this to redirect SMB traffic or leak credentials to the wrong server. This matters most if your environment uses curl for SMB operations, which is uncommon but not unheard of in scripted workflows.

Included because
network-facing; credential exposure risk; common utility
Affected estate
Azure Linux 3.0 systems with curl 8.11.1-6 installed.
How to check
Run `curl --version` or `tdnf list installed curl` and confirm version 8.11.1-6.
Action
Run `tdnf update curl` and verify the new version.
Urgency
Patch this week
Why it matters
Credential leakage or misdirected SMB traffic if curl's SMB protocol support is in use.
Source
Azure Linux advisory

Evidence trail

04

CVE-2026-39836

MSRC
7.5
CVSS EPSS 0.02%
Patch this week HIGH
GoGCCTensorFlowTensorBoardAzure LinuxLinux

Go's `net` package panics when it encounters a NUL byte in Dial or LookupPort calls on Windows. An attacker who can feed crafted input to a Go application's network dialing code can crash the process. This primarily affects Go applications running on Windows, but the Azure Linux packages include Go toolchain and Go-built dependencies like TensorFlow/TensorBoard.

Included because
denial of service; common runtime; multiple packages affected; attacker-controlled input path
Affected estate
Azure Linux 3.0 with golang 1.25.9-1 or 1.26.2-1, gcc 13.2.0-7, python-tensorboard 2.16.2-6, or tensorflow 2.16.1-11.
How to check
Run `go version` and `tdnf list installed golang gcc python-tensorboard tensorflow` to confirm affected versions.
Action
Run `tdnf update golang gcc python-tensorboard tensorflow`. Rebuild any locally compiled Go binaries with the updated toolchain.
Urgency
Patch this week
Why it matters
A crash in any Go service that accepts external input for network dialing can cause denial of service.
Source
Azure Linux advisory

Evidence trail

05

CVE-2026-37459

MSRC
7.5
CVSS EPSS 0.05%
Patch within 24h HIGH
FRRoutingAzure LinuxLinuxCloudNetwork Appliance

An integer underflow in FRRouting lets a remote attacker crash the BGP daemon by sending a crafted BGP UPDATE message. If your routers peer with untrusted or semi-trusted BGP neighbors, an attacker can take down your routing plane. This affects FRR stable/10.0 through stable/10.6.

Included because
remotely exploitable; no authentication needed; network infrastructure; denial of service against routing plane
Affected estate
Azure Linux 3.0 systems running frr 10.5.0-3 with BGP enabled.
How to check
Run `vtysh -c 'show version'` or `tdnf list installed frr` to confirm version 10.5.0-3.
Action
Run `tdnf update frr`, then restart the FRR service with `systemctl restart frr`. Validate BGP sessions come back up cleanly.
Urgency
Patch within 24 hours
Why it matters
A single crafted BGP UPDATE can crash your routing daemon, causing a network outage for everything behind it.
Source
Azure Linux advisory

Evidence trail


One email, every weekday morning.

You're in. Check your inbox.

Get the digest

Free. Weekday mornings. Plain English CVE triage.

Check your inbox to confirm.