{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"CRITICAL"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been executed.\n\nAffected versions are Apache MINA 2.0.0 <= 2.0.27, 2.1.0 <= 2.1.10, and 2.2.0 <= 2.2.5.\n\nThe problem is resolved in Apache MINA 2.0.28, 2.1.11, and 2.2.6 by applying the classname allowlist earlier.\n\nAffected are applications using Apache MINA that call IoBuffer.getObject().\n\nApplications using Apache MINA are advised to upgrade",
				"category":"general",
				"title":"Synopsis"
			}
		],
		"publisher":null,
		"references":[
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-41409"
			},
			{
				"summary":"CVE-2026-41409 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/cve/2026/csaf-openeuler-cve-2026-41409.json"
			},
			{
				"summary":"openEuler-SA-2026-2168",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2168"
			},
			{
				"summary":"CVE-2026-41409",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-41409&packageName=apache-mina"
			}
		],
		"title":"openEuler cve CVE-2026-41409",
		"tracking":{
			"initial_release_date":"2026-05-06T10:48:44+08:00",
			"revision_history":[
				{
					"date":"2026-05-06T10:48:44+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2026-05-06T10:48:44+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2026-05-06T10:48:44+08:00",
			"id":"CVE-2026-41409",
			"version":"1.0.0",
			"status":"interim"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"apache-mina-2.1.11-1.oe2403.noarch.rpm",
									"name":"apache-mina-2.1.11-1.oe2403.noarch.rpm"
								},
								"name":"apache-mina-2.1.11-1.oe2403.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"apache-mina-javadoc-2.1.11-1.oe2403.noarch.rpm",
									"name":"apache-mina-javadoc-2.1.11-1.oe2403.noarch.rpm"
								},
								"name":"apache-mina-javadoc-2.1.11-1.oe2403.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"apache-mina-mina-core-2.1.11-1.oe2403.noarch.rpm",
									"name":"apache-mina-mina-core-2.1.11-1.oe2403.noarch.rpm"
								},
								"name":"apache-mina-mina-core-2.1.11-1.oe2403.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"apache-mina-mina-filter-compression-2.1.11-1.oe2403.noarch.rpm",
									"name":"apache-mina-mina-filter-compression-2.1.11-1.oe2403.noarch.rpm"
								},
								"name":"apache-mina-mina-filter-compression-2.1.11-1.oe2403.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"apache-mina-mina-http-2.1.11-1.oe2403.noarch.rpm",
									"name":"apache-mina-mina-http-2.1.11-1.oe2403.noarch.rpm"
								},
								"name":"apache-mina-mina-http-2.1.11-1.oe2403.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"apache-mina-mina-statemachine-2.1.11-1.oe2403.noarch.rpm",
									"name":"apache-mina-mina-statemachine-2.1.11-1.oe2403.noarch.rpm"
								},
								"name":"apache-mina-mina-statemachine-2.1.11-1.oe2403.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"apache-mina-2.1.11-1.oe2403.src.rpm",
									"name":"apache-mina-2.1.11-1.oe2403.src.rpm"
								},
								"name":"apache-mina-2.1.11-1.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"apache-mina-2.1.11-1.oe2403.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:apache-mina-2.1.11-1.oe2403.noarch",
					"name":"apache-mina-2.1.11-1.oe2403.noarch as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"apache-mina-javadoc-2.1.11-1.oe2403.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:apache-mina-javadoc-2.1.11-1.oe2403.noarch",
					"name":"apache-mina-javadoc-2.1.11-1.oe2403.noarch as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"apache-mina-mina-core-2.1.11-1.oe2403.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:apache-mina-mina-core-2.1.11-1.oe2403.noarch",
					"name":"apache-mina-mina-core-2.1.11-1.oe2403.noarch as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"apache-mina-mina-filter-compression-2.1.11-1.oe2403.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:apache-mina-mina-filter-compression-2.1.11-1.oe2403.noarch",
					"name":"apache-mina-mina-filter-compression-2.1.11-1.oe2403.noarch as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"apache-mina-mina-http-2.1.11-1.oe2403.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:apache-mina-mina-http-2.1.11-1.oe2403.noarch",
					"name":"apache-mina-mina-http-2.1.11-1.oe2403.noarch as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"apache-mina-mina-statemachine-2.1.11-1.oe2403.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:apache-mina-mina-statemachine-2.1.11-1.oe2403.noarch",
					"name":"apache-mina-mina-statemachine-2.1.11-1.oe2403.noarch as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"apache-mina-2.1.11-1.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:apache-mina-2.1.11-1.oe2403.src",
					"name":"apache-mina-2.1.11-1.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2026-41409",
			"notes":[
				{
					"text":"The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been executed.\n\nAffected versions are Apache MINA 2.0.0 <= 2.0.27, 2.1.0 <= 2.1.10, and 2.2.0 <= 2.2.5.\n\nThe problem is resolved in Apache MINA 2.0.28, 2.1.11, and 2.2.6 by applying the classname allowlist earlier.\n\nAffected are applications using Apache MINA that call IoBuffer.getObject().\n\nApplications using Apache MINA are advised to upgrade",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:apache-mina-2.1.11-1.oe2403.noarch",
					"openEuler-24.03-LTS:apache-mina-javadoc-2.1.11-1.oe2403.noarch",
					"openEuler-24.03-LTS:apache-mina-mina-core-2.1.11-1.oe2403.noarch",
					"openEuler-24.03-LTS:apache-mina-mina-filter-compression-2.1.11-1.oe2403.noarch",
					"openEuler-24.03-LTS:apache-mina-mina-http-2.1.11-1.oe2403.noarch",
					"openEuler-24.03-LTS:apache-mina-mina-statemachine-2.1.11-1.oe2403.noarch",
					"openEuler-24.03-LTS:apache-mina-2.1.11-1.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":{
						"$ref":"$.vulnerabilities[0].product_status.fixed"
					},
					"details":"apache-mina security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2168"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"CRITICAL",
						"baseScore":9.8,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":{
						"$ref":"$.vulnerabilities[0].product_status.fixed"
					}
				}
			],
			"threats":[
				{
					"details":"Critical",
					"category":"impact"
				}
			],
			"title":"CVE-2026-41409"
		}
	]
}