Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-45286 (GCVE-0-2023-45286)
Vulnerability from cvelistv5 – Published: 2023-11-28 16:31 – Updated: 2024-08-28 20:01
VLAI?
EPSS
Summary
A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.
Severity ?
No CVSS data available.
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| github.com/go-resty/resty/v2 | github.com/go-resty/resty/v2 |
Affected:
2.10.0 , < 2.11.0
(semver)
|
Credits
Logan Attwood (@lattwood)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T20:21:15.309Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/go-resty/resty/issues/743"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/go-resty/resty/issues/739"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/go-resty/resty/pull/745"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e"
},
{
"tags": [
"x_transferred"
],
"url": "https://pkg.go.dev/vuln/GO-2023-2328"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-45286",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-28T20:00:00.708483Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T20:01:23.626Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "github.com/go-resty/resty/v2",
"product": "github.com/go-resty/resty/v2",
"programRoutines": [
{
"name": "handleRequestBody"
},
{
"name": "Backoff"
},
{
"name": "Request.Delete"
},
{
"name": "Request.Execute"
},
{
"name": "Request.Get"
},
{
"name": "Request.Head"
},
{
"name": "Request.Options"
},
{
"name": "Request.Patch"
},
{
"name": "Request.Post"
},
{
"name": "Request.Put"
},
{
"name": "Request.Send"
}
],
"vendor": "github.com/go-resty/resty/v2",
"versions": [
{
"lessThan": "2.11.0",
"status": "affected",
"version": "2.10.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Logan Attwood (@lattwood)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-04T18:41:48.460Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://github.com/go-resty/resty/issues/743"
},
{
"url": "https://github.com/go-resty/resty/issues/739"
},
{
"url": "https://github.com/go-resty/resty/pull/745"
},
{
"url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2328"
}
],
"title": "HTTP request body disclosure in github.com/go-resty/resty/v2"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2023-45286",
"datePublished": "2023-11-28T16:31:21.078Z",
"dateReserved": "2023-10-06T17:06:26.221Z",
"dateUpdated": "2024-08-28T20:01:23.626Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:resty_project:resty:*:*:*:*:*:go:*:*\", \"versionEndIncluding\": \"2.10.0\", \"matchCriteriaId\": \"433974E8-CB64-4BBB-BB5A-9F072275B86F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.\"}, {\"lang\": \"es\", \"value\": \"Una condici\\u00f3n de ejecuci\\u00f3n en go-resty puede dar como resultado la divulgaci\\u00f3n del cuerpo de la solicitud HTTP entre solicitudes. Esta condici\\u00f3n se puede desencadenar llamando a sync.Pool.Put con el mismo *bytes.Buffer m\\u00e1s de una vez, cuando los reintentos de solicitud est\\u00e1n habilitados y se produce un reintento. La llamada a sync.Pool.Get devolver\\u00e1 un bytes.Buffer al que no se le ha llamado bytes.Buffer.Reset. Este b\\u00fafer sucio contendr\\u00e1 el cuerpo de la solicitud HTTP de una solicitud no relacionada, y go-resty le agregar\\u00e1 el cuerpo de la solicitud HTTP actual, enviando dos cuerpos en una solicitud. El sync.Pool en cuesti\\u00f3n se define a nivel de paquete, por lo que un servidor completamente ajeno podr\\u00eda recibir el cuerpo de la solicitud.\"}]",
"id": "CVE-2023-45286",
"lastModified": "2024-11-21T08:26:42.103",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}]}",
"published": "2023-11-28T17:15:08.280",
"references": "[{\"url\": \"https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e\", \"source\": \"security@golang.org\"}, {\"url\": \"https://github.com/go-resty/resty/issues/739\", \"source\": \"security@golang.org\", \"tags\": [\"Exploit\", \"Issue Tracking\"]}, {\"url\": \"https://github.com/go-resty/resty/issues/743\", \"source\": \"security@golang.org\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/go-resty/resty/pull/745\", \"source\": \"security@golang.org\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://pkg.go.dev/vuln/GO-2023-2328\", \"source\": \"security@golang.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/go-resty/resty/issues/739\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\"]}, {\"url\": \"https://github.com/go-resty/resty/issues/743\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://github.com/go-resty/resty/pull/745\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://pkg.go.dev/vuln/GO-2023-2328\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-362\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-45286\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2023-11-28T17:15:08.280\",\"lastModified\":\"2024-11-21T08:26:42.103\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.\"},{\"lang\":\"es\",\"value\":\"Una condici\u00f3n de ejecuci\u00f3n en go-resty puede dar como resultado la divulgaci\u00f3n del cuerpo de la solicitud HTTP entre solicitudes. Esta condici\u00f3n se puede desencadenar llamando a sync.Pool.Put con el mismo *bytes.Buffer m\u00e1s de una vez, cuando los reintentos de solicitud est\u00e1n habilitados y se produce un reintento. La llamada a sync.Pool.Get devolver\u00e1 un bytes.Buffer al que no se le ha llamado bytes.Buffer.Reset. Este b\u00fafer sucio contendr\u00e1 el cuerpo de la solicitud HTTP de una solicitud no relacionada, y go-resty le agregar\u00e1 el cuerpo de la solicitud HTTP actual, enviando dos cuerpos en una solicitud. El sync.Pool en cuesti\u00f3n se define a nivel de paquete, por lo que un servidor completamente ajeno podr\u00eda recibir el cuerpo de la solicitud.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:resty_project:resty:*:*:*:*:*:go:*:*\",\"versionEndIncluding\":\"2.10.0\",\"matchCriteriaId\":\"433974E8-CB64-4BBB-BB5A-9F072275B86F\"}]}]}],\"references\":[{\"url\":\"https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e\",\"source\":\"security@golang.org\"},{\"url\":\"https://github.com/go-resty/resty/issues/739\",\"source\":\"security@golang.org\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://github.com/go-resty/resty/issues/743\",\"source\":\"security@golang.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/go-resty/resty/pull/745\",\"source\":\"security@golang.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2023-2328\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/go-resty/resty/issues/739\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://github.com/go-resty/resty/issues/743\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/go-resty/resty/pull/745\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2023-2328\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/go-resty/resty/issues/743\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/go-resty/resty/issues/739\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/go-resty/resty/pull/745\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://pkg.go.dev/vuln/GO-2023-2328\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T20:21:15.309Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-45286\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-28T20:00:00.708483Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-28T20:01:18.144Z\"}}], \"cna\": {\"title\": \"HTTP request body disclosure in github.com/go-resty/resty/v2\", \"credits\": [{\"lang\": \"en\", \"value\": \"Logan Attwood (@lattwood)\"}], \"affected\": [{\"vendor\": \"github.com/go-resty/resty/v2\", \"product\": \"github.com/go-resty/resty/v2\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.10.0\", \"lessThan\": \"2.11.0\", \"versionType\": \"semver\"}], \"packageName\": \"github.com/go-resty/resty/v2\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"handleRequestBody\"}, {\"name\": \"Backoff\"}, {\"name\": \"Request.Delete\"}, {\"name\": \"Request.Execute\"}, {\"name\": \"Request.Get\"}, {\"name\": \"Request.Head\"}, {\"name\": \"Request.Options\"}, {\"name\": \"Request.Patch\"}, {\"name\": \"Request.Post\"}, {\"name\": \"Request.Put\"}, {\"name\": \"Request.Send\"}]}], \"references\": [{\"url\": \"https://github.com/go-resty/resty/issues/743\"}, {\"url\": \"https://github.com/go-resty/resty/issues/739\"}, {\"url\": \"https://github.com/go-resty/resty/pull/745\"}, {\"url\": \"https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2023-2328\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2024-01-04T18:41:48.460Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-45286\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-28T20:01:23.626Z\", \"dateReserved\": \"2023-10-06T17:06:26.221Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2023-11-28T16:31:21.078Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
RHSA-2024:3621
Vulnerability from csaf_redhat - Published: 2024-06-05 05:15 - Updated: 2025-12-03 23:59Summary
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.2.0 operator/operand containers update
Notes
Topic
Red Hat OpenShift distributed tracing 3.2.0
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Release of Red Hat OpenShift distributed tracing provides these changes:
Security Fix(es):
* go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 (CVE-2023-45286)
* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)
* golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
* golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)
* golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift distributed tracing 3.2.0\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift distributed tracing provides these changes:\n\nSecurity Fix(es):\n\n* go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 (CVE-2023-45286)\n* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)\n* golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)\n* golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)\n* golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)\n* golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)\n* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)\n* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s)\nlisted in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:3621",
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2252012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252012"
},
{
"category": "external",
"summary": "2268017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268017"
},
{
"category": "external",
"summary": "2268018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268018"
},
{
"category": "external",
"summary": "2268019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268019"
},
{
"category": "external",
"summary": "2268021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268021"
},
{
"category": "external",
"summary": "2268022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268022"
},
{
"category": "external",
"summary": "2268046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046"
},
{
"category": "external",
"summary": "2268273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268273"
},
{
"category": "external",
"summary": "TRACING-3139",
"url": "https://issues.redhat.com/browse/TRACING-3139"
},
{
"category": "external",
"summary": "TRACING-3599",
"url": "https://issues.redhat.com/browse/TRACING-3599"
},
{
"category": "external",
"summary": "TRACING-3693",
"url": "https://issues.redhat.com/browse/TRACING-3693"
},
{
"category": "external",
"summary": "TRACING-3725",
"url": "https://issues.redhat.com/browse/TRACING-3725"
},
{
"category": "external",
"summary": "TRACING-3738",
"url": "https://issues.redhat.com/browse/TRACING-3738"
},
{
"category": "external",
"summary": "TRACING-3761",
"url": "https://issues.redhat.com/browse/TRACING-3761"
},
{
"category": "external",
"summary": "TRACING-3764",
"url": "https://issues.redhat.com/browse/TRACING-3764"
},
{
"category": "external",
"summary": "TRACING-3801",
"url": "https://issues.redhat.com/browse/TRACING-3801"
},
{
"category": "external",
"summary": "TRACING-3834",
"url": "https://issues.redhat.com/browse/TRACING-3834"
},
{
"category": "external",
"summary": "TRACING-3836",
"url": "https://issues.redhat.com/browse/TRACING-3836"
},
{
"category": "external",
"summary": "TRACING-3856",
"url": "https://issues.redhat.com/browse/TRACING-3856"
},
{
"category": "external",
"summary": "TRACING-3884",
"url": "https://issues.redhat.com/browse/TRACING-3884"
},
{
"category": "external",
"summary": "TRACING-3919",
"url": "https://issues.redhat.com/browse/TRACING-3919"
},
{
"category": "external",
"summary": "TRACING-3920",
"url": "https://issues.redhat.com/browse/TRACING-3920"
},
{
"category": "external",
"summary": "TRACING-3921",
"url": "https://issues.redhat.com/browse/TRACING-3921"
},
{
"category": "external",
"summary": "TRACING-3935",
"url": "https://issues.redhat.com/browse/TRACING-3935"
},
{
"category": "external",
"summary": "TRACING-3936",
"url": "https://issues.redhat.com/browse/TRACING-3936"
},
{
"category": "external",
"summary": "TRACING-3946",
"url": "https://issues.redhat.com/browse/TRACING-3946"
},
{
"category": "external",
"summary": "TRACING-3959",
"url": "https://issues.redhat.com/browse/TRACING-3959"
},
{
"category": "external",
"summary": "TRACING-3961",
"url": "https://issues.redhat.com/browse/TRACING-3961"
},
{
"category": "external",
"summary": "TRACING-3964",
"url": "https://issues.redhat.com/browse/TRACING-3964"
},
{
"category": "external",
"summary": "TRACING-3965",
"url": "https://issues.redhat.com/browse/TRACING-3965"
},
{
"category": "external",
"summary": "TRACING-3966",
"url": "https://issues.redhat.com/browse/TRACING-3966"
},
{
"category": "external",
"summary": "TRACING-3967",
"url": "https://issues.redhat.com/browse/TRACING-3967"
},
{
"category": "external",
"summary": "TRACING-3968",
"url": "https://issues.redhat.com/browse/TRACING-3968"
},
{
"category": "external",
"summary": "TRACING-3969",
"url": "https://issues.redhat.com/browse/TRACING-3969"
},
{
"category": "external",
"summary": "TRACING-3970",
"url": "https://issues.redhat.com/browse/TRACING-3970"
},
{
"category": "external",
"summary": "TRACING-3971",
"url": "https://issues.redhat.com/browse/TRACING-3971"
},
{
"category": "external",
"summary": "TRACING-3972",
"url": "https://issues.redhat.com/browse/TRACING-3972"
},
{
"category": "external",
"summary": "TRACING-3973",
"url": "https://issues.redhat.com/browse/TRACING-3973"
},
{
"category": "external",
"summary": "TRACING-3974",
"url": "https://issues.redhat.com/browse/TRACING-3974"
},
{
"category": "external",
"summary": "TRACING-3981",
"url": "https://issues.redhat.com/browse/TRACING-3981"
},
{
"category": "external",
"summary": "TRACING-4007",
"url": "https://issues.redhat.com/browse/TRACING-4007"
},
{
"category": "external",
"summary": "TRACING-4009",
"url": "https://issues.redhat.com/browse/TRACING-4009"
},
{
"category": "external",
"summary": "TRACING-4061",
"url": "https://issues.redhat.com/browse/TRACING-4061"
},
{
"category": "external",
"summary": "TRACING-4065",
"url": "https://issues.redhat.com/browse/TRACING-4065"
},
{
"category": "external",
"summary": "TRACING-4068",
"url": "https://issues.redhat.com/browse/TRACING-4068"
},
{
"category": "external",
"summary": "TRACING-4072",
"url": "https://issues.redhat.com/browse/TRACING-4072"
},
{
"category": "external",
"summary": "TRACING-4078",
"url": "https://issues.redhat.com/browse/TRACING-4078"
},
{
"category": "external",
"summary": "TRACING-4087",
"url": "https://issues.redhat.com/browse/TRACING-4087"
},
{
"category": "external",
"summary": "TRACING-4127",
"url": "https://issues.redhat.com/browse/TRACING-4127"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3621.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.2.0 operator/operand containers update",
"tracking": {
"current_release_date": "2025-12-03T23:59:24+00:00",
"generator": {
"date": "2025-12-03T23:59:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2024:3621",
"initial_release_date": "2024-06-05T05:15:15+00:00",
"revision_history": [
{
"date": "2024-06-05T05:15:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-06-05T05:15:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-03T23:59:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 3.2",
"product": {
"name": "Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.2::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.57.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.100.1-4"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.100.1-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"product": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"product_id": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"product_id": "rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.4.2-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=1.0.0-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=1.0.0-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"product_id": "rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.10.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.10.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"product_id": "rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.10.0-8"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.57.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.100.1-4"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.100.1-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"product_id": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"product_id": "rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.4.2-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=1.0.0-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=1.0.0-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"product_id": "rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.10.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.10.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"product_id": "rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.10.0-8"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.57.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.100.1-4"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.100.1-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"product": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"product_id": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"product_id": "rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.4.2-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=1.0.0-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=1.0.0-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"product_id": "rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.10.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.10.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"product_id": "rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.10.0-8"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.57.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.100.1-4"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.100.1-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"product": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"product_id": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64",
"product_id": "rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.4.2-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=1.0.0-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=1.0.0-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"product_id": "rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.10.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.10.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"product_id": "rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.10.0-8"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64"
},
"product_reference": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64"
},
"product_reference": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x"
},
"product_reference": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45286",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2023-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2252012"
}
],
"notes": [
{
"category": "description",
"text": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45286"
},
{
"category": "external",
"summary": "RHBZ#2252012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45286"
}
],
"release_date": "2023-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2"
},
{
"acknowledgments": [
{
"names": [
"Bartek Nowotarski"
],
"organization": "nowotarski.info"
}
],
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268273"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates the security impact of this vulnerability as Important due to the worst case scenario resulting in a denial of service. It is simple to exploit, could significantly impact availability, and there is not a suitable mitigation for all use cases. Once an attack has ended, the system should return to normal operations on its own.\n\nThis vulnerability only impacts servers which have HTTP/2 enabled. It stems from an imperfect definition of the protocol. As the Go programming language is widely utilized across nearly every major Red Hat offering, a full listing of impacted packages will not be provided. Therefore, the \u201cAffected Packages and Issued Red Hat Security Errata\u201d section contains a simplified list of what offerings need to remediate this vulnerability. Every impacted offering has at least one representative component listed, but potentially not all of them. Rest assured that Red Hat is committed to remediating this vulnerability across our entire portfolio.\n\nMany components are rated as Low impact due to configurations which reduce the attack surface or significantly increase the difficulty of exploitation. A summary of these scenarios are:\n* The container includes a package that provides a vulnerable webserver, but it is not used or running during operation\n* HTTP/2 is disabled by default and is not supported\n* Only a client implementation is provided, which is not vulnerable\n* A vulnerable module (either golang.org/net/http or golang.org/x/net/http2) is included, but disabled\n* Access to a vulnerable server is restricted within the container (loopback only connections)\n* Golang is available in the container but is not used\n\n\nWithin the Red Hat OpenShift Container Platform, the majority of vulnerable components are not externally accessible. This means an attacker must already have access to a container within your environment to exploit this vulnerability. However, the ose-hyperkube (openshift-enterprise-hyperkube) container is externally accessible, so there are less barriers to exploitation. Fixes for this specific container are already available.\n\nWithin Red Hat Ansible Automation Platform, the impacted component is Receptor. The impact has been reduced to Low as the vulnerable code is present, but not utilized. There are three potential exposures within this component:\n* Receptor utilizes QUIC a UDP based protocol which does not run over HTTP/2\n* Receptor utilizes the x/net/ipv4 and ipv6 packages, both of which are not affected",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45288"
},
{
"category": "external",
"summary": "RHBZ#2268273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288"
},
{
"category": "external",
"summary": "https://nowotarski.info/http2-continuation-flood/",
"url": "https://nowotarski.info/http2-continuation-flood/"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2687",
"url": "https://pkg.go.dev/vuln/GO-2024-2687"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/421644",
"url": "https://www.kb.cert.org/vuls/id/421644"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "In some environments where http/2 support is not required, it may be possible to disable this feature to reduce risk.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS"
},
{
"cve": "CVE-2023-45289",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-03-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268018"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go\u0027s net/http/cookiejar standard library package. When following an HTTP redirect to a domain that is not a subdomain match or an exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45289"
},
{
"category": "external",
"summary": "RHBZ#2268018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268018"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45289",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45289"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect"
},
{
"cve": "CVE-2023-45290",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268017"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in Go\u0027s net/http standard library package. When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections such as IPS/IDS and antimalware solutions help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45290"
},
{
"category": "external",
"summary": "RHBZ#2268017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268017"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45290",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45290"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2024/03/08/4",
"url": "http://www.openwall.com/lists/oss-security/2024/03/08/4"
},
{
"category": "external",
"summary": "https://go.dev/cl/569341",
"url": "https://go.dev/cl/569341"
},
{
"category": "external",
"summary": "https://go.dev/issue/65383",
"url": "https://go.dev/issue/65383"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg",
"url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2599",
"url": "https://pkg.go.dev/vuln/GO-2024-2599"
},
{
"category": "external",
"summary": "https://security.netapp.com/advisory/ntap-20240329-0004",
"url": "https://security.netapp.com/advisory/ntap-20240329-0004"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm"
},
{
"cve": "CVE-2024-24783",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-03-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268019"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go\u0027s crypto/x509 standard library package. Verifying a certificate chain that contains a certificate with an unknown public key algorithm will cause a Certificate.Verify to panic. This issue affects all crypto/tls clients and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation leading to a CWE-400: Uncontrolled Resource Consumption vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces least functionality, enabling only essential features, services, and ports to minimize the attack surface for improper input handling. Secure development practices, such as static code analysis, peer reviews, and strict input validation, detect and remediate unsafe patterns early in the lifecycle, reducing the risk of malformed input causing instability or resource exhaustion. Process isolation confines untrusted workloads to restricted domains, preventing a single process from monopolizing shared resources. Malicious code protections, including IDS/IPS and antimalware tools, detect and mitigate input-driven resource consumption and denial-of-service attempts in real time. Centralized logging and continuous monitoring provide visibility into abnormal resource behavior, enabling rapid detection and response. Additionally, web application firewalls and load-balancing controls further limit the impact of uncontrolled input or resource use, maintaining platform stability and performance.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24783"
},
{
"category": "external",
"summary": "RHBZ#2268019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24783"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2024/03/08/4",
"url": "http://www.openwall.com/lists/oss-security/2024/03/08/4"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-3q2c-pvp5-3cqp",
"url": "https://github.com/advisories/GHSA-3q2c-pvp5-3cqp"
},
{
"category": "external",
"summary": "https://go.dev/cl/569339",
"url": "https://go.dev/cl/569339"
},
{
"category": "external",
"summary": "https://go.dev/issue/65390",
"url": "https://go.dev/issue/65390"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg",
"url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2598",
"url": "https://pkg.go.dev/vuln/GO-2024-2598"
},
{
"category": "external",
"summary": "https://security.netapp.com/advisory/ntap-20240329-0005",
"url": "https://security.netapp.com/advisory/ntap-20240329-0005"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm"
},
{
"cve": "CVE-2024-24784",
"cwe": {
"id": "CWE-115",
"name": "Misinterpretation of Input"
},
"discovery_date": "2024-03-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268021"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go\u0027s net/mail standard library package. The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions made by programs using different parsers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/mail: comments in display names are incorrectly handled",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-115: Misinterpretation of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nControls like information input validation and error handling help mitigate the risks associated with this weakness by enforcing strict input validation and secure error management. Error handling ensures that all input data is validated against predefined formats, preventing malformed or unexpected inputs from being misinterpreted by the system. By enforcing strong typing, allow listing, and proper encoding, this control reduces the likelihood of injection attacks and unintended code execution.\n\nInput validation complements this by ensuring that errors do not expose sensitive system details or cause unpredictable behavior. Secure error handling prevents attackers from gaining insight into system functionality through detailed error messages while ensuring the system remains stable even when faced with malformed inputs. Together, these controls reduce the attack surface by maintaining predictable input processing and preventing exploitable system states, ultimately strengthening an organization\u0027s security posture against input misinterpretation vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24784"
},
{
"category": "external",
"summary": "RHBZ#2268021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268021"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24784"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/mail: comments in display names are incorrectly handled"
},
{
"cve": "CVE-2024-24785",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"discovery_date": "2024-03-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268022"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go\u0027s html/template standard library package. If errors returned from MarshalJSON methods contain user-controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing subsequent actions to inject unexpected content into templates.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: errors returned from MarshalJSON methods may break template escaping",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24785"
},
{
"category": "external",
"summary": "RHBZ#2268022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268022"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24785",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24785"
},
{
"category": "external",
"summary": "https://go.dev/cl/564196",
"url": "https://go.dev/cl/564196"
},
{
"category": "external",
"summary": "https://go.dev/issue/65697",
"url": "https://go.dev/issue/65697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg",
"url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2024-2610.json",
"url": "https://vuln.go.dev/ID/GO-2024-2610.json"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: errors returned from MarshalJSON methods may break template escaping"
},
{
"cve": "CVE-2024-24786",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268046"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang\u0027s protobuf module, where the unmarshal function can enter an infinite loop when processing certain invalid inputs. This issue occurs during unmarshaling into a message that includes a google.protobuf.Any or when the UnmarshalOptions.DiscardUnknown option is enabled. This flaw allows an attacker to craft malicious input tailored to trigger the identified flaw in the unmarshal function. By providing carefully constructed invalid inputs, they could potentially cause the function to enter an infinite loop, resulting in a denial of service condition or other unintended behaviors in the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to ensure the most restrictive setting needed for operational requirements. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, enabling capabilities like excessive CPU usage, long execution times, or processes consuming abnormal amounts of memory. Static code analysis and peer code review techniques are used to execute robust input validation and error-handling mechanisms to ensure all user inputs are thoroughly validated, preventing infinite loops caused by malformed or unexpected input, such as unbounded user input or unexpected null values that cause loops to never terminate. In the event of successful exploitation, process isolation limits the effect of an infinite loop to a single process rather than allowing it to consume all system resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24786"
},
{
"category": "external",
"summary": "RHBZ#2268046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786"
},
{
"category": "external",
"summary": "https://go.dev/cl/569356",
"url": "https://go.dev/cl/569356"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/",
"url": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2611",
"url": "https://pkg.go.dev/vuln/GO-2024-2611"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON"
}
]
}
RHSA-2024_3316
Vulnerability from csaf_redhat - Published: 2024-05-23 06:39 - Updated: 2024-12-17 22:43Summary
Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update
Notes
Topic
Migration Toolkit for Applications 7.0.3 release
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Migration Toolkit for Applications 7.0.3 Images
Security Fix(es) from Bugzilla:
* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
* webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)
* axios: exposure of confidential data stored in cookies (CVE-2023-45857)
* css-tools: Improper Input Validation causes Denial of Service via Regular Expression (CVE-2023-26364)
* go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 (CVE-2023-45286)
* golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)
* golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)
* css-tools: regular expression denial of service (ReDoS) when parsing CSS (CVE-2023-48631)
* follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)
* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
* follow-redirects: Possible credential leak (CVE-2024-28849)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Migration Toolkit for Applications 7.0.3 release\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Migration Toolkit for Applications 7.0.3 Images\n\nSecurity Fix(es) from Bugzilla:\n\n* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)\n\n* webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)\n\n* axios: exposure of confidential data stored in cookies (CVE-2023-45857)\n\n* css-tools: Improper Input Validation causes Denial of Service via Regular Expression (CVE-2023-26364)\n\n* go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 (CVE-2023-45286)\n\n* golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)\n\n* golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)\n\n* css-tools: regular expression denial of service (ReDoS) when parsing CSS (CVE-2023-48631)\n\n* follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)\n\n* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)\n\n* follow-redirects: Possible credential leak (CVE-2024-28849)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:3316",
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2248979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979"
},
{
"category": "external",
"summary": "2250364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250364"
},
{
"category": "external",
"summary": "2252012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252012"
},
{
"category": "external",
"summary": "2253193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253193"
},
{
"category": "external",
"summary": "2253330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253330"
},
{
"category": "external",
"summary": "2254559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254559"
},
{
"category": "external",
"summary": "2256413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256413"
},
{
"category": "external",
"summary": "2268046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046"
},
{
"category": "external",
"summary": "2268273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268273"
},
{
"category": "external",
"summary": "2269576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2269576"
},
{
"category": "external",
"summary": "2270863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270863"
},
{
"category": "external",
"summary": "MTA-1578",
"url": "https://issues.redhat.com/browse/MTA-1578"
},
{
"category": "external",
"summary": "MTA-1959",
"url": "https://issues.redhat.com/browse/MTA-1959"
},
{
"category": "external",
"summary": "MTA-1961",
"url": "https://issues.redhat.com/browse/MTA-1961"
},
{
"category": "external",
"summary": "MTA-1970",
"url": "https://issues.redhat.com/browse/MTA-1970"
},
{
"category": "external",
"summary": "MTA-1997",
"url": "https://issues.redhat.com/browse/MTA-1997"
},
{
"category": "external",
"summary": "MTA-2003",
"url": "https://issues.redhat.com/browse/MTA-2003"
},
{
"category": "external",
"summary": "MTA-2117",
"url": "https://issues.redhat.com/browse/MTA-2117"
},
{
"category": "external",
"summary": "MTA-2186",
"url": "https://issues.redhat.com/browse/MTA-2186"
},
{
"category": "external",
"summary": "MTA-2224",
"url": "https://issues.redhat.com/browse/MTA-2224"
},
{
"category": "external",
"summary": "MTA-2243",
"url": "https://issues.redhat.com/browse/MTA-2243"
},
{
"category": "external",
"summary": "MTA-2287",
"url": "https://issues.redhat.com/browse/MTA-2287"
},
{
"category": "external",
"summary": "MTA-2308",
"url": "https://issues.redhat.com/browse/MTA-2308"
},
{
"category": "external",
"summary": "MTA-2314",
"url": "https://issues.redhat.com/browse/MTA-2314"
},
{
"category": "external",
"summary": "MTA-2341",
"url": "https://issues.redhat.com/browse/MTA-2341"
},
{
"category": "external",
"summary": "MTA-2380",
"url": "https://issues.redhat.com/browse/MTA-2380"
},
{
"category": "external",
"summary": "MTA-2400",
"url": "https://issues.redhat.com/browse/MTA-2400"
},
{
"category": "external",
"summary": "MTA-2409",
"url": "https://issues.redhat.com/browse/MTA-2409"
},
{
"category": "external",
"summary": "MTA-2410",
"url": "https://issues.redhat.com/browse/MTA-2410"
},
{
"category": "external",
"summary": "MTA-2426",
"url": "https://issues.redhat.com/browse/MTA-2426"
},
{
"category": "external",
"summary": "MTA-2427",
"url": "https://issues.redhat.com/browse/MTA-2427"
},
{
"category": "external",
"summary": "MTA-2451",
"url": "https://issues.redhat.com/browse/MTA-2451"
},
{
"category": "external",
"summary": "MTA-2452",
"url": "https://issues.redhat.com/browse/MTA-2452"
},
{
"category": "external",
"summary": "MTA-2495",
"url": "https://issues.redhat.com/browse/MTA-2495"
},
{
"category": "external",
"summary": "MTA-2503",
"url": "https://issues.redhat.com/browse/MTA-2503"
},
{
"category": "external",
"summary": "MTA-2505",
"url": "https://issues.redhat.com/browse/MTA-2505"
},
{
"category": "external",
"summary": "MTA-2512",
"url": "https://issues.redhat.com/browse/MTA-2512"
},
{
"category": "external",
"summary": "MTA-2513",
"url": "https://issues.redhat.com/browse/MTA-2513"
},
{
"category": "external",
"summary": "MTA-2518",
"url": "https://issues.redhat.com/browse/MTA-2518"
},
{
"category": "external",
"summary": "MTA-2550",
"url": "https://issues.redhat.com/browse/MTA-2550"
},
{
"category": "external",
"summary": "MTA-2560",
"url": "https://issues.redhat.com/browse/MTA-2560"
},
{
"category": "external",
"summary": "MTA-2563",
"url": "https://issues.redhat.com/browse/MTA-2563"
},
{
"category": "external",
"summary": "MTA-2616",
"url": "https://issues.redhat.com/browse/MTA-2616"
},
{
"category": "external",
"summary": "MTA-2652",
"url": "https://issues.redhat.com/browse/MTA-2652"
},
{
"category": "external",
"summary": "MTA-2654",
"url": "https://issues.redhat.com/browse/MTA-2654"
},
{
"category": "external",
"summary": "MTA-2661",
"url": "https://issues.redhat.com/browse/MTA-2661"
},
{
"category": "external",
"summary": "MTA-2681",
"url": "https://issues.redhat.com/browse/MTA-2681"
},
{
"category": "external",
"summary": "MTA-2781",
"url": "https://issues.redhat.com/browse/MTA-2781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3316.json"
}
],
"title": "Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update",
"tracking": {
"current_release_date": "2024-12-17T22:43:26+00:00",
"generator": {
"date": "2024-12-17T22:43:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:3316",
"initial_release_date": "2024-05-23T06:39:32+00:00",
"revision_history": [
{
"date": "2024-05-23T06:39:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-05-23T06:39:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T22:43:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MTA 7.0 for RHEL 9",
"product": {
"name": "MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:migration_toolkit_applications:7.0::el9"
}
}
},
{
"category": "product_name",
"name": "MTA 7.0 for RHEL 8",
"product": {
"name": "MTA 7.0 for RHEL 8",
"product_id": "8Base-MTA-7.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:migration_toolkit_applications:7.0::el8"
}
}
}
],
"category": "product_family",
"name": "Migration Toolkit for Applications"
},
{
"branches": [
{
"category": "product_version",
"name": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"product": {
"name": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"product_id": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-addon-rhel9\u0026tag=7.0.3-13"
}
}
},
{
"category": "product_version",
"name": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"product": {
"name": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"product_id": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-lsp-rhel9\u0026tag=7.0.3-13"
}
}
},
{
"category": "product_version",
"name": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"product": {
"name": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"product_id": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-cli-rhel9\u0026tag=7.0.3-16"
}
}
},
{
"category": "product_version",
"name": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"product": {
"name": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"product_id": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-hub-rhel9\u0026tag=7.0.3-10"
}
}
},
{
"category": "product_version",
"name": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"product": {
"name": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"product_id": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-operator-bundle\u0026tag=7.0.3-25"
}
}
},
{
"category": "product_version",
"name": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"product": {
"name": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"product_id": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-rhel8-operator\u0026tag=7.0.3-7"
}
}
},
{
"category": "product_version",
"name": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"product": {
"name": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"product_id": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-ui-rhel9\u0026tag=7.0.3-13"
}
}
},
{
"category": "product_version",
"name": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64",
"product": {
"name": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64",
"product_id": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-windup-shim-rhel9\u0026tag=7.0.3-12"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"product": {
"name": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"product_id": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc?arch=arm64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-lsp-rhel9\u0026tag=7.0.3-13"
}
}
},
{
"category": "product_version",
"name": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"product": {
"name": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"product_id": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99?arch=arm64\u0026repository_url=registry.redhat.io/mta/mta-cli-rhel9\u0026tag=7.0.3-16"
}
}
},
{
"category": "product_version",
"name": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"product": {
"name": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"product_id": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092?arch=arm64\u0026repository_url=registry.redhat.io/mta/mta-windup-shim-rhel9\u0026tag=7.0.3-12"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64 as a component of MTA 7.0 for RHEL 8",
"product_id": "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64"
},
"product_reference": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"relates_to_product_reference": "8Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64"
},
"product_reference": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64"
},
"product_reference": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64"
},
"product_reference": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64"
},
"product_reference": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
},
"product_reference": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64"
},
"product_reference": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64"
},
"product_reference": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
},
"product_reference": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64"
},
"product_reference": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
},
"product_reference": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26159",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256413"
}
],
"notes": [
{
"category": "description",
"text": "An Improper Input Validation flaw was found in follow-redirects due to the improper handling of URLs by the url.parse() function. When a new URL() throws an error, it can be manipulated to misinterpret the hostname. This issue could allow an attacker to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "follow-redirects is a transitive dependency of Grafana, and does not affect Red Hat Enterprise Linux 8.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26159"
},
{
"category": "external",
"summary": "RHBZ#2256413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256413"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159"
}
],
"release_date": "2024-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()"
},
{
"cve": "CVE-2023-26364",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-11-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2250364"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Adobe CSS Tools. An improper input validation could result in a minor denial of service while parsing a malicious CSS with the parse component. User interaction and privileges are not required to jeopardize an environment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "css-tools: Improper Input Validation causes Denial of Service via Regular Expression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26364"
},
{
"category": "external",
"summary": "RHBZ#2250364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250364"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26364"
},
{
"category": "external",
"summary": "https://github.com/adobe/css-tools/security/advisories/GHSA-hpx4-r86g-5jrg",
"url": "https://github.com/adobe/css-tools/security/advisories/GHSA-hpx4-r86g-5jrg"
}
],
"release_date": "2023-11-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "No mitigation is yet available for this vulnerability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "css-tools: Improper Input Validation causes Denial of Service via Regular Expression"
},
{
"cve": "CVE-2023-39326",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253330"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Golang net/http/internal package. This issue may allow a malicious user to send an HTTP request and cause the receiver to read more bytes from network than are in the body (up to 1GiB), causing the receiver to fail reading the response, possibly leading to a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39326"
},
{
"category": "external",
"summary": "RHBZ#2253330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253330"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39326",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39326"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2382",
"url": "https://pkg.go.dev/vuln/GO-2023-2382"
}
],
"release_date": "2023-12-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "No mitigation is available for this flaw.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests"
},
{
"cve": "CVE-2023-45286",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2023-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2252012"
}
],
"notes": [
{
"category": "description",
"text": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45286"
},
{
"category": "external",
"summary": "RHBZ#2252012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45286"
}
],
"release_date": "2023-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2"
},
{
"cve": "CVE-2023-45287",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253193"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Golang crypto/tls standard library. In previous versions, the package was vulnerable to a Timing Side Channel attack by observing the time it took for RSA-based TLS key exchanges, which was not constant. This flaw allows a malicious user to gather information from the environment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The identified flaw in the Golang crypto/tls library, is assessed as a moderate severity issue rather than important due to several mitigating factors. Although the vulnerability exposes a Timing Side Channel, potentially allowing information retrieval through RSA-based TLS key exchanges, its exploitation demands significant access and expertise. Additionally, while earlier versions implemented RSA blinding to counter timing attacks, the removal of PKCS#1 padding may still leak timing data. However, the practicality of exploiting this flaw is limited, and the transition to a fully constant time RSA implementation in Go 1.20 significantly bolsters security, reducing the risk posed by timing side channels.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45287"
},
{
"category": "external",
"summary": "RHBZ#2253193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253193"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45287"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2375",
"url": "https://pkg.go.dev/vuln/GO-2023-2375"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "No current mitigation is available for this vulnerability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges."
},
{
"acknowledgments": [
{
"names": [
"Bartek Nowotarski"
],
"organization": "nowotarski.info"
}
],
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268273"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates the security impact of this vulnerability as Important due to the worst case scenario resulting in a denial of service. It is simple to exploit, could significantly impact availability, and there is not a suitable mitigation for all use cases. Once an attack has ended, the system should return to normal operations on its own.\n\nThis vulnerability only impacts servers which have HTTP/2 enabled. It stems from an imperfect definition of the protocol. As the Go programming language is widely utilized across nearly every major Red Hat offering, a full listing of impacted packages will not be provided. Therefore, the \u201cAffected Packages and Issued Red Hat Security Errata\u201d section contains a simplified list of what offerings need to remediate this vulnerability. Every impacted offering has at least one representative component listed, but potentially not all of them. Rest assured that Red Hat is committed to remediating this vulnerability across our entire portfolio.\n\nMany components are rated as Low impact due to configurations which reduce the attack surface or significantly increase the difficulty of exploitation. A summary of these scenarios are:\n* The container includes a package that provides a vulnerable webserver, but it is not used or running during operation\n* HTTP/2 is disabled by default and is not supported\n* Only a client implementation is provided, which is not vulnerable\n* A vulnerable module (either golang.org/net/http or golang.org/x/net/http2) is included, but disabled\n* Access to a vulnerable server is restricted within the container (loopback only connections)\n* Golang is available in the container but is not used\n\n\nWithin the Red Hat OpenShift Container Platform, the majority of vulnerable components are not externally accessible. This means an attacker must already have access to a container within your environment to exploit this vulnerability. However, the ose-hyperkube (openshift-enterprise-hyperkube) container is externally accessible, so there are less barriers to exploitation. Fixes for this specific container are already available.\n\nWithin Red Hat Ansible Automation Platform, the impacted component is Receptor. The impact has been reduced to Low as the vulnerable code is present, but not utilized. There are three potential exposures within this component:\n* Receptor utilizes QUIC a UDP based protocol which does not run over HTTP/2\n* Receptor utilizes the x/net/ipv4 and ipv6 packages, both of which are not affected",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45288"
},
{
"category": "external",
"summary": "RHBZ#2268273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288"
},
{
"category": "external",
"summary": "https://nowotarski.info/http2-continuation-flood/",
"url": "https://nowotarski.info/http2-continuation-flood/"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2687",
"url": "https://pkg.go.dev/vuln/GO-2024-2687"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/421644",
"url": "https://www.kb.cert.org/vuls/id/421644"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "In some environments where http/2 support is not required, it may be possible to disable this feature to reduce risk.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS"
},
{
"cve": "CVE-2023-45857",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-11-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2248979"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Axios that may expose a confidential session token. This issue can allow a remote attacker to bypass security measures and view sensitive data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: exposure of confidential data stored in cookies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected container was deprecated in ACM 2.5 version which is not anymore supported. Following versions of this product are not impacted by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45857"
},
{
"category": "external",
"summary": "RHBZ#2248979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857"
}
],
"release_date": "2023-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "axios: exposure of confidential data stored in cookies"
},
{
"cve": "CVE-2023-48631",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2254559"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in Adobe\u0027s css-tools when parsing CSS. This issue occurs due to improper input validation and may allow an attacker to use a carefully crafted input string to cause a denial of service, especially when attempting to parse CSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "css-tools: regular expression denial of service (ReDoS) when parsing CSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Regular Expression Denial of Service (ReDoS) vulnerability in css-tools, triggered by improper input validation when parsing CSS, is considered of moderate severity. While it can lead to a denial of service by causing the application to become unresponsive, the impact is limited to scenarios where an attacker can provide crafted input. Additionally, the absence of evidence of active exploitation in the wild and contextual factors, such as the software\u0027s usage, contribute to the moderate severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-48631"
},
{
"category": "external",
"summary": "RHBZ#2254559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-48631",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48631"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-48631",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48631"
},
{
"category": "external",
"summary": "https://github.com/adobe/css-tools/security/advisories/GHSA-prr3-c3m5-p7q2",
"url": "https://github.com/adobe/css-tools/security/advisories/GHSA-prr3-c3m5-p7q2"
}
],
"release_date": "2023-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "css-tools: regular expression denial of service (ReDoS) when parsing CSS"
},
{
"cve": "CVE-2024-24786",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268046"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang\u0027s protobuf module, where the unmarshal function can enter an infinite loop when processing certain invalid inputs. This issue occurs during unmarshaling into a message that includes a google.protobuf.Any or when the UnmarshalOptions.DiscardUnknown option is enabled. This flaw allows an attacker to craft malicious input tailored to trigger the identified flaw in the unmarshal function. By providing carefully constructed invalid inputs, they could potentially cause the function to enter an infinite loop, resulting in a denial of service condition or other unintended behaviors in the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24786"
},
{
"category": "external",
"summary": "RHBZ#2268046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786"
},
{
"category": "external",
"summary": "https://go.dev/cl/569356",
"url": "https://go.dev/cl/569356"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/",
"url": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2611",
"url": "https://pkg.go.dev/vuln/GO-2024-2611"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-03-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2269576"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the follow-redirects package. While processing the cross-domain redirection, `follow-redirects` clears authorization headers, however, it misses clearing proxy-authentication headers, which contain credentials as well. This issue may lead to credential leaking, having a high impact on data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "follow-redirects: Possible credential leak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-28849"
},
{
"category": "external",
"summary": "RHBZ#2269576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2269576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849"
},
{
"category": "external",
"summary": "https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp",
"url": "https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp"
}
],
"release_date": "2024-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "follow-redirects: Possible credential leak"
},
{
"cve": "CVE-2024-29180",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2024-03-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270863"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webpack-dev-middleware package, where it failed to validate the supplied URL address sufficiently before returning local files. This flaw allows an attacker to craft URLs to return arbitrary local files from the developer\u0027s machine. The lack of normalization before calling the middleware also allows the attacker to perform path traversal attacks on the target environment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webpack-dev-middleware: lack of URL validation may lead to file leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability in webpack-dev represents a important security issue due to its potential to expose sensitive files and compromise developer machines. By failing to validate URLs and normalize paths effectively, the middleware allows attackers to craft malicious requests that can retrieve arbitrary local files or perform unauthorized path traversal. This could lead to unauthorized access to confidential information, including source code, configuration files, and even system-level files. Given the widespread use of webpack-dev-middleware in web development environments, addressing this vulnerability promptly is important to prevent serious data breaches and protect the integrity of development processes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29180"
},
{
"category": "external",
"summary": "RHBZ#2270863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29180"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29180",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29180"
},
{
"category": "external",
"summary": "https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6",
"url": "https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6"
}
],
"release_date": "2024-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webpack-dev-middleware: lack of URL validation may lead to file leak"
}
]
}
RHSA-2024_3621
Vulnerability from csaf_redhat - Published: 2024-06-05 05:15 - Updated: 2024-12-17 22:44Summary
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.2.0 operator/operand containers update
Notes
Topic
Red Hat OpenShift distributed tracing 3.2.0
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Release of Red Hat OpenShift distributed tracing provides these changes:
Security Fix(es):
* go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 (CVE-2023-45286)
* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)
* golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
* golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)
* golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift distributed tracing 3.2.0\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift distributed tracing provides these changes:\n\nSecurity Fix(es):\n\n* go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 (CVE-2023-45286)\n* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)\n* golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)\n* golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)\n* golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)\n* golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)\n* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)\n* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s)\nlisted in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:3621",
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2252012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252012"
},
{
"category": "external",
"summary": "2268017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268017"
},
{
"category": "external",
"summary": "2268018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268018"
},
{
"category": "external",
"summary": "2268019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268019"
},
{
"category": "external",
"summary": "2268021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268021"
},
{
"category": "external",
"summary": "2268022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268022"
},
{
"category": "external",
"summary": "2268046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046"
},
{
"category": "external",
"summary": "2268273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268273"
},
{
"category": "external",
"summary": "TRACING-3139",
"url": "https://issues.redhat.com/browse/TRACING-3139"
},
{
"category": "external",
"summary": "TRACING-3599",
"url": "https://issues.redhat.com/browse/TRACING-3599"
},
{
"category": "external",
"summary": "TRACING-3693",
"url": "https://issues.redhat.com/browse/TRACING-3693"
},
{
"category": "external",
"summary": "TRACING-3725",
"url": "https://issues.redhat.com/browse/TRACING-3725"
},
{
"category": "external",
"summary": "TRACING-3738",
"url": "https://issues.redhat.com/browse/TRACING-3738"
},
{
"category": "external",
"summary": "TRACING-3761",
"url": "https://issues.redhat.com/browse/TRACING-3761"
},
{
"category": "external",
"summary": "TRACING-3764",
"url": "https://issues.redhat.com/browse/TRACING-3764"
},
{
"category": "external",
"summary": "TRACING-3801",
"url": "https://issues.redhat.com/browse/TRACING-3801"
},
{
"category": "external",
"summary": "TRACING-3834",
"url": "https://issues.redhat.com/browse/TRACING-3834"
},
{
"category": "external",
"summary": "TRACING-3836",
"url": "https://issues.redhat.com/browse/TRACING-3836"
},
{
"category": "external",
"summary": "TRACING-3856",
"url": "https://issues.redhat.com/browse/TRACING-3856"
},
{
"category": "external",
"summary": "TRACING-3884",
"url": "https://issues.redhat.com/browse/TRACING-3884"
},
{
"category": "external",
"summary": "TRACING-3919",
"url": "https://issues.redhat.com/browse/TRACING-3919"
},
{
"category": "external",
"summary": "TRACING-3920",
"url": "https://issues.redhat.com/browse/TRACING-3920"
},
{
"category": "external",
"summary": "TRACING-3921",
"url": "https://issues.redhat.com/browse/TRACING-3921"
},
{
"category": "external",
"summary": "TRACING-3935",
"url": "https://issues.redhat.com/browse/TRACING-3935"
},
{
"category": "external",
"summary": "TRACING-3936",
"url": "https://issues.redhat.com/browse/TRACING-3936"
},
{
"category": "external",
"summary": "TRACING-3946",
"url": "https://issues.redhat.com/browse/TRACING-3946"
},
{
"category": "external",
"summary": "TRACING-3959",
"url": "https://issues.redhat.com/browse/TRACING-3959"
},
{
"category": "external",
"summary": "TRACING-3961",
"url": "https://issues.redhat.com/browse/TRACING-3961"
},
{
"category": "external",
"summary": "TRACING-3964",
"url": "https://issues.redhat.com/browse/TRACING-3964"
},
{
"category": "external",
"summary": "TRACING-3965",
"url": "https://issues.redhat.com/browse/TRACING-3965"
},
{
"category": "external",
"summary": "TRACING-3966",
"url": "https://issues.redhat.com/browse/TRACING-3966"
},
{
"category": "external",
"summary": "TRACING-3967",
"url": "https://issues.redhat.com/browse/TRACING-3967"
},
{
"category": "external",
"summary": "TRACING-3968",
"url": "https://issues.redhat.com/browse/TRACING-3968"
},
{
"category": "external",
"summary": "TRACING-3969",
"url": "https://issues.redhat.com/browse/TRACING-3969"
},
{
"category": "external",
"summary": "TRACING-3970",
"url": "https://issues.redhat.com/browse/TRACING-3970"
},
{
"category": "external",
"summary": "TRACING-3971",
"url": "https://issues.redhat.com/browse/TRACING-3971"
},
{
"category": "external",
"summary": "TRACING-3972",
"url": "https://issues.redhat.com/browse/TRACING-3972"
},
{
"category": "external",
"summary": "TRACING-3973",
"url": "https://issues.redhat.com/browse/TRACING-3973"
},
{
"category": "external",
"summary": "TRACING-3974",
"url": "https://issues.redhat.com/browse/TRACING-3974"
},
{
"category": "external",
"summary": "TRACING-3981",
"url": "https://issues.redhat.com/browse/TRACING-3981"
},
{
"category": "external",
"summary": "TRACING-4007",
"url": "https://issues.redhat.com/browse/TRACING-4007"
},
{
"category": "external",
"summary": "TRACING-4009",
"url": "https://issues.redhat.com/browse/TRACING-4009"
},
{
"category": "external",
"summary": "TRACING-4061",
"url": "https://issues.redhat.com/browse/TRACING-4061"
},
{
"category": "external",
"summary": "TRACING-4065",
"url": "https://issues.redhat.com/browse/TRACING-4065"
},
{
"category": "external",
"summary": "TRACING-4068",
"url": "https://issues.redhat.com/browse/TRACING-4068"
},
{
"category": "external",
"summary": "TRACING-4072",
"url": "https://issues.redhat.com/browse/TRACING-4072"
},
{
"category": "external",
"summary": "TRACING-4078",
"url": "https://issues.redhat.com/browse/TRACING-4078"
},
{
"category": "external",
"summary": "TRACING-4087",
"url": "https://issues.redhat.com/browse/TRACING-4087"
},
{
"category": "external",
"summary": "TRACING-4127",
"url": "https://issues.redhat.com/browse/TRACING-4127"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3621.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.2.0 operator/operand containers update",
"tracking": {
"current_release_date": "2024-12-17T22:44:28+00:00",
"generator": {
"date": "2024-12-17T22:44:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:3621",
"initial_release_date": "2024-06-05T05:15:15+00:00",
"revision_history": [
{
"date": "2024-06-05T05:15:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-06-05T05:15:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T22:44:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 3.2",
"product": {
"name": "Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.2::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.57.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.100.1-4"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.100.1-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"product": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"product_id": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"product_id": "rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.4.2-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=1.0.0-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=1.0.0-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"product_id": "rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.10.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.10.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"product_id": "rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.10.0-8"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.57.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.100.1-4"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.100.1-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"product_id": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"product_id": "rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.4.2-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=1.0.0-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=1.0.0-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"product_id": "rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.10.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.10.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"product_id": "rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.10.0-8"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.57.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.100.1-4"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.100.1-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"product": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"product_id": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"product_id": "rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.4.2-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=1.0.0-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=1.0.0-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"product_id": "rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.10.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.10.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"product_id": "rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.10.0-8"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.57.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.57.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.57.0-5"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.100.1-4"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.100.1-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"product": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"product_id": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8\u0026tag=0.100.1-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64",
"product_id": "rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.4.2-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=1.0.0-8"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=1.0.0-9"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"product_id": "rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.10.0-20"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.10.0-6"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"product_id": "rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.10.0-8"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64"
},
"product_reference": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64"
},
"product_reference": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x"
},
"product_reference": "rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64 as a component of Red Hat OpenShift distributed tracing 3.2",
"product_id": "8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45286",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2023-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2252012"
}
],
"notes": [
{
"category": "description",
"text": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45286"
},
{
"category": "external",
"summary": "RHBZ#2252012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45286"
}
],
"release_date": "2023-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2"
},
{
"acknowledgments": [
{
"names": [
"Bartek Nowotarski"
],
"organization": "nowotarski.info"
}
],
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268273"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates the security impact of this vulnerability as Important due to the worst case scenario resulting in a denial of service. It is simple to exploit, could significantly impact availability, and there is not a suitable mitigation for all use cases. Once an attack has ended, the system should return to normal operations on its own.\n\nThis vulnerability only impacts servers which have HTTP/2 enabled. It stems from an imperfect definition of the protocol. As the Go programming language is widely utilized across nearly every major Red Hat offering, a full listing of impacted packages will not be provided. Therefore, the \u201cAffected Packages and Issued Red Hat Security Errata\u201d section contains a simplified list of what offerings need to remediate this vulnerability. Every impacted offering has at least one representative component listed, but potentially not all of them. Rest assured that Red Hat is committed to remediating this vulnerability across our entire portfolio.\n\nMany components are rated as Low impact due to configurations which reduce the attack surface or significantly increase the difficulty of exploitation. A summary of these scenarios are:\n* The container includes a package that provides a vulnerable webserver, but it is not used or running during operation\n* HTTP/2 is disabled by default and is not supported\n* Only a client implementation is provided, which is not vulnerable\n* A vulnerable module (either golang.org/net/http or golang.org/x/net/http2) is included, but disabled\n* Access to a vulnerable server is restricted within the container (loopback only connections)\n* Golang is available in the container but is not used\n\n\nWithin the Red Hat OpenShift Container Platform, the majority of vulnerable components are not externally accessible. This means an attacker must already have access to a container within your environment to exploit this vulnerability. However, the ose-hyperkube (openshift-enterprise-hyperkube) container is externally accessible, so there are less barriers to exploitation. Fixes for this specific container are already available.\n\nWithin Red Hat Ansible Automation Platform, the impacted component is Receptor. The impact has been reduced to Low as the vulnerable code is present, but not utilized. There are three potential exposures within this component:\n* Receptor utilizes QUIC a UDP based protocol which does not run over HTTP/2\n* Receptor utilizes the x/net/ipv4 and ipv6 packages, both of which are not affected",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45288"
},
{
"category": "external",
"summary": "RHBZ#2268273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288"
},
{
"category": "external",
"summary": "https://nowotarski.info/http2-continuation-flood/",
"url": "https://nowotarski.info/http2-continuation-flood/"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2687",
"url": "https://pkg.go.dev/vuln/GO-2024-2687"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/421644",
"url": "https://www.kb.cert.org/vuls/id/421644"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "In some environments where http/2 support is not required, it may be possible to disable this feature to reduce risk.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS"
},
{
"cve": "CVE-2023-45289",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-03-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268018"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go\u0027s net/http/cookiejar standard library package. When following an HTTP redirect to a domain that is not a subdomain match or an exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45289"
},
{
"category": "external",
"summary": "RHBZ#2268018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268018"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45289",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45289"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect"
},
{
"cve": "CVE-2023-45290",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268017"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in Go\u0027s net/http standard library package. When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45290"
},
{
"category": "external",
"summary": "RHBZ#2268017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268017"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45290",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45290"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2024/03/08/4",
"url": "http://www.openwall.com/lists/oss-security/2024/03/08/4"
},
{
"category": "external",
"summary": "https://go.dev/cl/569341",
"url": "https://go.dev/cl/569341"
},
{
"category": "external",
"summary": "https://go.dev/issue/65383",
"url": "https://go.dev/issue/65383"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg",
"url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2599",
"url": "https://pkg.go.dev/vuln/GO-2024-2599"
},
{
"category": "external",
"summary": "https://security.netapp.com/advisory/ntap-20240329-0004",
"url": "https://security.netapp.com/advisory/ntap-20240329-0004"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm"
},
{
"cve": "CVE-2024-24783",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-03-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268019"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go\u0027s crypto/x509 standard library package. Verifying a certificate chain that contains a certificate with an unknown public key algorithm will cause a Certificate.Verify to panic. This issue affects all crypto/tls clients and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24783"
},
{
"category": "external",
"summary": "RHBZ#2268019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24783"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2024/03/08/4",
"url": "http://www.openwall.com/lists/oss-security/2024/03/08/4"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-3q2c-pvp5-3cqp",
"url": "https://github.com/advisories/GHSA-3q2c-pvp5-3cqp"
},
{
"category": "external",
"summary": "https://go.dev/cl/569339",
"url": "https://go.dev/cl/569339"
},
{
"category": "external",
"summary": "https://go.dev/issue/65390",
"url": "https://go.dev/issue/65390"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg",
"url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2598",
"url": "https://pkg.go.dev/vuln/GO-2024-2598"
},
{
"category": "external",
"summary": "https://security.netapp.com/advisory/ntap-20240329-0005",
"url": "https://security.netapp.com/advisory/ntap-20240329-0005"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm"
},
{
"cve": "CVE-2024-24784",
"cwe": {
"id": "CWE-115",
"name": "Misinterpretation of Input"
},
"discovery_date": "2024-03-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268021"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go\u0027s net/mail standard library package. The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions made by programs using different parsers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/mail: comments in display names are incorrectly handled",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24784"
},
{
"category": "external",
"summary": "RHBZ#2268021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268021"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24784"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/mail: comments in display names are incorrectly handled"
},
{
"cve": "CVE-2024-24785",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"discovery_date": "2024-03-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268022"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go\u0027s html/template standard library package. If errors returned from MarshalJSON methods contain user-controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing subsequent actions to inject unexpected content into templates.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: errors returned from MarshalJSON methods may break template escaping",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24785"
},
{
"category": "external",
"summary": "RHBZ#2268022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268022"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24785",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24785"
},
{
"category": "external",
"summary": "https://go.dev/cl/564196",
"url": "https://go.dev/cl/564196"
},
{
"category": "external",
"summary": "https://go.dev/issue/65697",
"url": "https://go.dev/issue/65697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg",
"url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2024-2610.json",
"url": "https://vuln.go.dev/ID/GO-2024-2610.json"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: errors returned from MarshalJSON methods may break template escaping"
},
{
"cve": "CVE-2024-24786",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268046"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang\u0027s protobuf module, where the unmarshal function can enter an infinite loop when processing certain invalid inputs. This issue occurs during unmarshaling into a message that includes a google.protobuf.Any or when the UnmarshalOptions.DiscardUnknown option is enabled. This flaw allows an attacker to craft malicious input tailored to trigger the identified flaw in the unmarshal function. By providing carefully constructed invalid inputs, they could potentially cause the function to enter an infinite loop, resulting in a denial of service condition or other unintended behaviors in the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24786"
},
{
"category": "external",
"summary": "RHBZ#2268046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786"
},
{
"category": "external",
"summary": "https://go.dev/cl/569356",
"url": "https://go.dev/cl/569356"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/",
"url": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2611",
"url": "https://pkg.go.dev/vuln/GO-2024-2611"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-06-05T05:15:15+00:00",
"details": "Red Hat OpenShift distributed tracing Release",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:27792a6b4e0aa3a1620e1ec98e2060fae5de6c239e60d5dc6e124662080ce7d9_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:ae9746e42b1522e4cbae8060db136340543790e452c5872da35c29f57706901d_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:c23914b0cc1670fee56143e59cce8d381c38ab8c2a215371eccb2c7e55049884_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-agent-rhel8@sha256:d8a55508e2b685367d9452565a6a8f9ab9970d2b48184961bdb09bf7cc693873_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:1d0b55cbbaa33b53753259bbaedd57de3855ffc1e7db34f29b2d63df1b61a49a_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:5c21a151c7c26f2034faa1e389a0e826385f87962af02a842c547c71ffc98717_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:bc9558144a4364e99a434675aba9abe9c8a21b3cae3fce211f41b48ac77e5c9c_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-all-in-one-rhel8@sha256:f78cbbb9e49f3d97bbcb7401ef11f6dcdefaca998f99a5316f2a875c13bd961e_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:07f636db696baff7866fb4940d63e83cc0677406ce1c16eafb1bca103d6b79f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:205ab4f1c0af638ed46ade4150710c46d53d53033e70dbbdbc59f1e5049809e8_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:de513774bafbe13f28269ef398c0fcbce17ef06dcd9e1190f592dd5aab727f41_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-collector-rhel8@sha256:ece5d3c01ed8ef464ca65cfd9e831eeec4d6f31bd3cc4091360aea7d319e639f_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:50eda5a5ac77cbe807f37044a9de9679d724508388abffed13ffef79b62e8d81_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:c6363e9d1b807e1ad598ee6541c11090db20cc3fbee08e8532348218de6eaf88_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ca1211cf71262694bb32930e2bc290ec25bf7ee4abe705dccd93c84c01da7eca_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:eec0d1b9744193f951a5953a9ec4c15979b1a8fee5ed9b37f65d4f0ff115fb73_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:1091e265a40b4569dd480923286e137e251fae6ecac7428a085274a53f9b6db5_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:2463ea0e593a8efde7dc084ac6c600605542fcda7132355486120bceb410a6e2_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:9029cfb58fd669dd4fd701c8854310d36db4109ace6ba85b4e3193447bb2e502_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-es-rollover-rhel8@sha256:ed10dd0093277b3daeab8213e3d318953aabcd3dd9bc17f0e5e8116f8f51b1e2_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:20ef07b52fd87c442138fdd52d39162deb10d8bb32766a1c837c9380ed1ddefe_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:827fb6fc29ad955af6f14f79956d0f3bec745f8c13518a1f140f7408558d12fe_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:8f094de652472f0cabbf955e7aedf53b223d1976e4bb59d6decb2742b6ca3ec5_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-ingester-rhel8@sha256:ffb39ba0786e2713b0ad90772178997815a202cf620ceb667065642df823e2cd_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:760dfab4b65dce1a6a031ee394bc82b1f2701e6bb4b613ca2eeb82046717eeee_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:a34a6d931dd7197210c7406a24c182ddf4a0c6fb2c078224ac2cbb627204078f_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e6bdfda1fc7a64452e02a22225849deae558c0a965880ff17d999532453e5254_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-operator-bundle@sha256:e8a90eae01013ce7573d132d48bb3590b762b7d8a11740342d0762852ddb6c35_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:1fe9ba6c2f4b11a0cd15613465f511ea442f4f62955fd54859d1dceddc211e9e_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:3a941aad751883b698f572946f2c178894c045967f5d262dcff0f6ca1e514e02_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:a2d5393a22f5d78424cfc126c56b8140987eb148ee795b869f73c74d5c1932df_s390x",
"8Base-RHOSDT-3.2:rhosdt/jaeger-query-rhel8@sha256:bb4e2a5694e1864998f26dfdb87507be2ac0030b095f1b7f8cf65ee550e936cd_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:2b232100f137812445c19195ea21b783288ea0f23e95a7bd5008be41476d6337_arm64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:9e486e93aff524044e86fb8be786cb7f10ff9aa2e3f8d7139882054d9b124b74_amd64",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:a2efafae008d1904624f7c0852639e312796979e940c70693feee56198690668_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/jaeger-rhel8-operator@sha256:b46fe6592710f591fd9202953a8c56abbc565852b0ebb10f2130fe7b6e8ce1d0_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:368bd918212faf7028c3846288a7363d5d029cd3a4fe8114afb83735df3ed32a_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:60b43ac5df04a4a91917c15014c035f6a684bb2f484838fbccf4fb4faa46b384_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:76463e2a6f568fa185624b6d06a103f93cba166676788e8bb21d5172a86dae2e_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-collector-rhel8@sha256:b5b3453bf195cc5815eaf1383ad6e924260c36090661e1415313b72bdcd7ad08_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:9df026b6442362eec9acd554454d28f8908070bfae7282c6562ef7eaf2f9e90c_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:a774ad73186756aa2660c58eb0a1b3910ead47ac8b645ced581a7e6158f8f7ef_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:bfc2ac2670869a21f5caf7861f8d06b6080dd2f0b3ee6e544aaa36ed8eba70f6_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-operator-bundle@sha256:d4635599d6fe39706334c7cc1409430adbcbe2729b1fa77879894c5e9bb8bc3c_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:120cf7965f52583f9bb5c3781974842b5efb1dbb82083bd9327c85fd13ea3557_s390x",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:3a988bde87ea7e8e219ea91e6de9e7f3d8fa2056c83adfec09703d4f58519333_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:ae9fcaf972c9508c8af2b1f2c6f0f50d153a05016aa7a741cd08b064aba57846_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-rhel8-operator@sha256:e4f793dedca25ea1088bced096867f3a6bd62993ea5e345cb07124970a5b56a5_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:1a64e871543aab22d6b923aede1228f789accb39bb7e522ae68c3dc49856ccf2_amd64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:2752e6ef2e9ab085ce7b0d132adb40cb4c6f92c85d5e9fe1fe08558dbaea42ba_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:325af1869893f9f2972b25d73aca79f3bf36da75b880420856602e7d088663cd_arm64",
"8Base-RHOSDT-3.2:rhosdt/opentelemetry-target-allocator-rhel8@sha256:9ba19a1174f54736c0c4c8ef037516e94328a624c7c8e4ba0b40c3f348205eb6_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:53bf6446ffd5132da567a03bc6fa14c17a77815082f83af4a39649529e788f51_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7762b7fbf871260b782de24b118ee91f2f7f23fa740b6764f478c2dad4dc18f_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:c7c49ef6de3623428e47e1dc7c04b22efe17c73e7e988e3b82fa3517116cf8f3_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-opa-rhel8@sha256:e7747bb7cb3d172d1016cbb38a8de9a849112267b36b0350d3b1ad4a603f5fd1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:1c48235a37632868996a586de3af951a0c431f330530d69e18919218aa3e6232_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:3bf498bb1cac2fc6267c52cac0131919598b9ea4797b697ace569191657ddce8_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:5a82cb946a46010543ae60fc687badd8c4e526600f8a5268717f1094ecbc3f9d_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-gateway-rhel8@sha256:d1de2fa5972f7ee5932c413c78bc11a23e3136f82bbcbf3e731c003155af88d8_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:449e58da948a2a1e8a4908c37267122ce4b9696ad6299523c480f6e9987a8042_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:6363601e99696d96f81b881116ac15a1c0be08906a2f7719c9d022d1b379daf3_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:9369d07611c5ef34db98fbf2f1b941fea1543f1714f32cb236b3e5bd67fd874b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-operator-bundle@sha256:b983271f0f7c78154bb832360c6713f58f038831a4eae3fc2d909cca44e7cf66_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:22aa7922788f6a703b51b56558b54369f45d904b3978bb6471c142a2cdabb190_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:727bd8daf604ed227bd9aa2eca975c2ac919622f78f0bfd021fd80da77aac276_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:8dfad5ab487fa64eff9f1df4ef3200598c36f0e2237b84690f4dc2b73d1f33b6_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-query-rhel8@sha256:ffc931e655e4df7188fbff3887bedf91a6dc23c71753453d8093c6eb1af1cd98_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:03ae5a76933914cfd5e2ae2c8da1d7f886b57cc9e0a954059323697f5abeb4a1_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:7c326607144719ff6777132f8a171cd37bf6952cc0ed71590d02a9468ecf7fc1_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:90907b84124887f2960e76f83bccce99155a055fb981c8665cc77d1e0db25f4b_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8-operator@sha256:98ea46342862aa212b834cbc520686ab09490a99a51a692a78f675b2e1528ea2_amd64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:00c803fa54e7aa08f58d6dfa475359d6ba15737ec24ea7a81558bf5c01084e8e_arm64",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:655e29477d0b278a9f1b782f272dddefc133d12887860635d94b135c6bff4f10_ppc64le",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:7718afadf1b976b81dfdac45d75875bb90dec50768e08f8f7927ae351298170f_s390x",
"8Base-RHOSDT-3.2:rhosdt/tempo-rhel8@sha256:a4e7a0a2d6dade9d883b6d080563736076befe6faa77da65f6ae77882af88c26_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON"
}
]
}
RHSA-2024:3316
Vulnerability from csaf_redhat - Published: 2024-05-23 06:39 - Updated: 2025-12-03 23:59Summary
Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update
Notes
Topic
Migration Toolkit for Applications 7.0.3 release
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Migration Toolkit for Applications 7.0.3 Images
Security Fix(es) from Bugzilla:
* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
* webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)
* axios: exposure of confidential data stored in cookies (CVE-2023-45857)
* css-tools: Improper Input Validation causes Denial of Service via Regular Expression (CVE-2023-26364)
* go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 (CVE-2023-45286)
* golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)
* golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)
* css-tools: regular expression denial of service (ReDoS) when parsing CSS (CVE-2023-48631)
* follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)
* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
* follow-redirects: Possible credential leak (CVE-2024-28849)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Migration Toolkit for Applications 7.0.3 release\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Migration Toolkit for Applications 7.0.3 Images\n\nSecurity Fix(es) from Bugzilla:\n\n* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)\n\n* webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)\n\n* axios: exposure of confidential data stored in cookies (CVE-2023-45857)\n\n* css-tools: Improper Input Validation causes Denial of Service via Regular Expression (CVE-2023-26364)\n\n* go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 (CVE-2023-45286)\n\n* golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)\n\n* golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)\n\n* css-tools: regular expression denial of service (ReDoS) when parsing CSS (CVE-2023-48631)\n\n* follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)\n\n* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)\n\n* follow-redirects: Possible credential leak (CVE-2024-28849)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:3316",
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2248979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979"
},
{
"category": "external",
"summary": "2250364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250364"
},
{
"category": "external",
"summary": "2252012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252012"
},
{
"category": "external",
"summary": "2253193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253193"
},
{
"category": "external",
"summary": "2253330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253330"
},
{
"category": "external",
"summary": "2254559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254559"
},
{
"category": "external",
"summary": "2256413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256413"
},
{
"category": "external",
"summary": "2268046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046"
},
{
"category": "external",
"summary": "2268273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268273"
},
{
"category": "external",
"summary": "2269576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2269576"
},
{
"category": "external",
"summary": "2270863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270863"
},
{
"category": "external",
"summary": "MTA-1578",
"url": "https://issues.redhat.com/browse/MTA-1578"
},
{
"category": "external",
"summary": "MTA-1959",
"url": "https://issues.redhat.com/browse/MTA-1959"
},
{
"category": "external",
"summary": "MTA-1961",
"url": "https://issues.redhat.com/browse/MTA-1961"
},
{
"category": "external",
"summary": "MTA-1970",
"url": "https://issues.redhat.com/browse/MTA-1970"
},
{
"category": "external",
"summary": "MTA-1997",
"url": "https://issues.redhat.com/browse/MTA-1997"
},
{
"category": "external",
"summary": "MTA-2003",
"url": "https://issues.redhat.com/browse/MTA-2003"
},
{
"category": "external",
"summary": "MTA-2117",
"url": "https://issues.redhat.com/browse/MTA-2117"
},
{
"category": "external",
"summary": "MTA-2186",
"url": "https://issues.redhat.com/browse/MTA-2186"
},
{
"category": "external",
"summary": "MTA-2224",
"url": "https://issues.redhat.com/browse/MTA-2224"
},
{
"category": "external",
"summary": "MTA-2243",
"url": "https://issues.redhat.com/browse/MTA-2243"
},
{
"category": "external",
"summary": "MTA-2287",
"url": "https://issues.redhat.com/browse/MTA-2287"
},
{
"category": "external",
"summary": "MTA-2308",
"url": "https://issues.redhat.com/browse/MTA-2308"
},
{
"category": "external",
"summary": "MTA-2314",
"url": "https://issues.redhat.com/browse/MTA-2314"
},
{
"category": "external",
"summary": "MTA-2341",
"url": "https://issues.redhat.com/browse/MTA-2341"
},
{
"category": "external",
"summary": "MTA-2380",
"url": "https://issues.redhat.com/browse/MTA-2380"
},
{
"category": "external",
"summary": "MTA-2400",
"url": "https://issues.redhat.com/browse/MTA-2400"
},
{
"category": "external",
"summary": "MTA-2409",
"url": "https://issues.redhat.com/browse/MTA-2409"
},
{
"category": "external",
"summary": "MTA-2410",
"url": "https://issues.redhat.com/browse/MTA-2410"
},
{
"category": "external",
"summary": "MTA-2426",
"url": "https://issues.redhat.com/browse/MTA-2426"
},
{
"category": "external",
"summary": "MTA-2427",
"url": "https://issues.redhat.com/browse/MTA-2427"
},
{
"category": "external",
"summary": "MTA-2451",
"url": "https://issues.redhat.com/browse/MTA-2451"
},
{
"category": "external",
"summary": "MTA-2452",
"url": "https://issues.redhat.com/browse/MTA-2452"
},
{
"category": "external",
"summary": "MTA-2495",
"url": "https://issues.redhat.com/browse/MTA-2495"
},
{
"category": "external",
"summary": "MTA-2503",
"url": "https://issues.redhat.com/browse/MTA-2503"
},
{
"category": "external",
"summary": "MTA-2505",
"url": "https://issues.redhat.com/browse/MTA-2505"
},
{
"category": "external",
"summary": "MTA-2512",
"url": "https://issues.redhat.com/browse/MTA-2512"
},
{
"category": "external",
"summary": "MTA-2513",
"url": "https://issues.redhat.com/browse/MTA-2513"
},
{
"category": "external",
"summary": "MTA-2518",
"url": "https://issues.redhat.com/browse/MTA-2518"
},
{
"category": "external",
"summary": "MTA-2550",
"url": "https://issues.redhat.com/browse/MTA-2550"
},
{
"category": "external",
"summary": "MTA-2560",
"url": "https://issues.redhat.com/browse/MTA-2560"
},
{
"category": "external",
"summary": "MTA-2563",
"url": "https://issues.redhat.com/browse/MTA-2563"
},
{
"category": "external",
"summary": "MTA-2616",
"url": "https://issues.redhat.com/browse/MTA-2616"
},
{
"category": "external",
"summary": "MTA-2652",
"url": "https://issues.redhat.com/browse/MTA-2652"
},
{
"category": "external",
"summary": "MTA-2654",
"url": "https://issues.redhat.com/browse/MTA-2654"
},
{
"category": "external",
"summary": "MTA-2661",
"url": "https://issues.redhat.com/browse/MTA-2661"
},
{
"category": "external",
"summary": "MTA-2681",
"url": "https://issues.redhat.com/browse/MTA-2681"
},
{
"category": "external",
"summary": "MTA-2781",
"url": "https://issues.redhat.com/browse/MTA-2781"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3316.json"
}
],
"title": "Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update",
"tracking": {
"current_release_date": "2025-12-03T23:59:26+00:00",
"generator": {
"date": "2025-12-03T23:59:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2024:3316",
"initial_release_date": "2024-05-23T06:39:32+00:00",
"revision_history": [
{
"date": "2024-05-23T06:39:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-05-23T06:39:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-03T23:59:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MTA 7.0 for RHEL 9",
"product": {
"name": "MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:migration_toolkit_applications:7.0::el9"
}
}
},
{
"category": "product_name",
"name": "MTA 7.0 for RHEL 8",
"product": {
"name": "MTA 7.0 for RHEL 8",
"product_id": "8Base-MTA-7.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:migration_toolkit_applications:7.0::el8"
}
}
}
],
"category": "product_family",
"name": "Migration Toolkit for Applications"
},
{
"branches": [
{
"category": "product_version",
"name": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"product": {
"name": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"product_id": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-addon-rhel9\u0026tag=7.0.3-13"
}
}
},
{
"category": "product_version",
"name": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"product": {
"name": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"product_id": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-lsp-rhel9\u0026tag=7.0.3-13"
}
}
},
{
"category": "product_version",
"name": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"product": {
"name": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"product_id": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-cli-rhel9\u0026tag=7.0.3-16"
}
}
},
{
"category": "product_version",
"name": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"product": {
"name": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"product_id": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-hub-rhel9\u0026tag=7.0.3-10"
}
}
},
{
"category": "product_version",
"name": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"product": {
"name": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"product_id": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-operator-bundle\u0026tag=7.0.3-25"
}
}
},
{
"category": "product_version",
"name": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"product": {
"name": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"product_id": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-rhel8-operator\u0026tag=7.0.3-7"
}
}
},
{
"category": "product_version",
"name": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"product": {
"name": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"product_id": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-ui-rhel9\u0026tag=7.0.3-13"
}
}
},
{
"category": "product_version",
"name": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64",
"product": {
"name": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64",
"product_id": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-windup-shim-rhel9\u0026tag=7.0.3-12"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"product": {
"name": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"product_id": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc?arch=arm64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-lsp-rhel9\u0026tag=7.0.3-13"
}
}
},
{
"category": "product_version",
"name": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"product": {
"name": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"product_id": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99?arch=arm64\u0026repository_url=registry.redhat.io/mta/mta-cli-rhel9\u0026tag=7.0.3-16"
}
}
},
{
"category": "product_version",
"name": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"product": {
"name": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"product_id": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092?arch=arm64\u0026repository_url=registry.redhat.io/mta/mta-windup-shim-rhel9\u0026tag=7.0.3-12"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64 as a component of MTA 7.0 for RHEL 8",
"product_id": "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64"
},
"product_reference": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"relates_to_product_reference": "8Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64"
},
"product_reference": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64"
},
"product_reference": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64"
},
"product_reference": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64"
},
"product_reference": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
},
"product_reference": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64"
},
"product_reference": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64"
},
"product_reference": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
},
"product_reference": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64"
},
"product_reference": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"relates_to_product_reference": "9Base-MTA-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64 as a component of MTA 7.0 for RHEL 9",
"product_id": "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
},
"product_reference": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64",
"relates_to_product_reference": "9Base-MTA-7.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26159",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256413"
}
],
"notes": [
{
"category": "description",
"text": "An Improper Input Validation flaw was found in follow-redirects due to the improper handling of URLs by the url.parse() function. When a new URL() throws an error, it can be manipulated to misinterpret the hostname. This issue could allow an attacker to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "follow-redirects is a transitive dependency of Grafana, and does not affect Red Hat Enterprise Linux 8.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26159"
},
{
"category": "external",
"summary": "RHBZ#2256413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256413"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159"
}
],
"release_date": "2024-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()"
},
{
"cve": "CVE-2023-26364",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-11-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2250364"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Adobe CSS Tools. An improper input validation could result in a minor denial of service while parsing a malicious CSS with the parse component. User interaction and privileges are not required to jeopardize an environment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "css-tools: Improper Input Validation causes Denial of Service via Regular Expression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26364"
},
{
"category": "external",
"summary": "RHBZ#2250364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250364"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26364"
},
{
"category": "external",
"summary": "https://github.com/adobe/css-tools/security/advisories/GHSA-hpx4-r86g-5jrg",
"url": "https://github.com/adobe/css-tools/security/advisories/GHSA-hpx4-r86g-5jrg"
}
],
"release_date": "2023-11-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "No mitigation is yet available for this vulnerability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "css-tools: Improper Input Validation causes Denial of Service via Regular Expression"
},
{
"cve": "CVE-2023-39326",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253330"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Golang net/http/internal package. This issue may allow a malicious user to send an HTTP request and cause the receiver to read more bytes from network than are in the body (up to 1GiB), causing the receiver to fail reading the response, possibly leading to a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39326"
},
{
"category": "external",
"summary": "RHBZ#2253330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253330"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39326",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39326"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2382",
"url": "https://pkg.go.dev/vuln/GO-2023-2382"
}
],
"release_date": "2023-12-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "No mitigation is available for this flaw.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests"
},
{
"cve": "CVE-2023-45286",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2023-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2252012"
}
],
"notes": [
{
"category": "description",
"text": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45286"
},
{
"category": "external",
"summary": "RHBZ#2252012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45286"
}
],
"release_date": "2023-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2"
},
{
"cve": "CVE-2023-45287",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253193"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Golang crypto/tls standard library. In previous versions, the package was vulnerable to a Timing Side Channel attack by observing the time it took for RSA-based TLS key exchanges, which was not constant. This flaw allows a malicious user to gather information from the environment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The identified flaw in the Golang crypto/tls library, is assessed as a moderate severity issue rather than important due to several mitigating factors. Although the vulnerability exposes a Timing Side Channel, potentially allowing information retrieval through RSA-based TLS key exchanges, its exploitation demands significant access and expertise. Additionally, while earlier versions implemented RSA blinding to counter timing attacks, the removal of PKCS#1 padding may still leak timing data. However, the practicality of exploiting this flaw is limited, and the transition to a fully constant time RSA implementation in Go 1.20 significantly bolsters security, reducing the risk posed by timing side channels.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45287"
},
{
"category": "external",
"summary": "RHBZ#2253193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253193"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45287"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2375",
"url": "https://pkg.go.dev/vuln/GO-2023-2375"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "No current mitigation is available for this vulnerability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges."
},
{
"acknowledgments": [
{
"names": [
"Bartek Nowotarski"
],
"organization": "nowotarski.info"
}
],
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268273"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates the security impact of this vulnerability as Important due to the worst case scenario resulting in a denial of service. It is simple to exploit, could significantly impact availability, and there is not a suitable mitigation for all use cases. Once an attack has ended, the system should return to normal operations on its own.\n\nThis vulnerability only impacts servers which have HTTP/2 enabled. It stems from an imperfect definition of the protocol. As the Go programming language is widely utilized across nearly every major Red Hat offering, a full listing of impacted packages will not be provided. Therefore, the \u201cAffected Packages and Issued Red Hat Security Errata\u201d section contains a simplified list of what offerings need to remediate this vulnerability. Every impacted offering has at least one representative component listed, but potentially not all of them. Rest assured that Red Hat is committed to remediating this vulnerability across our entire portfolio.\n\nMany components are rated as Low impact due to configurations which reduce the attack surface or significantly increase the difficulty of exploitation. A summary of these scenarios are:\n* The container includes a package that provides a vulnerable webserver, but it is not used or running during operation\n* HTTP/2 is disabled by default and is not supported\n* Only a client implementation is provided, which is not vulnerable\n* A vulnerable module (either golang.org/net/http or golang.org/x/net/http2) is included, but disabled\n* Access to a vulnerable server is restricted within the container (loopback only connections)\n* Golang is available in the container but is not used\n\n\nWithin the Red Hat OpenShift Container Platform, the majority of vulnerable components are not externally accessible. This means an attacker must already have access to a container within your environment to exploit this vulnerability. However, the ose-hyperkube (openshift-enterprise-hyperkube) container is externally accessible, so there are less barriers to exploitation. Fixes for this specific container are already available.\n\nWithin Red Hat Ansible Automation Platform, the impacted component is Receptor. The impact has been reduced to Low as the vulnerable code is present, but not utilized. There are three potential exposures within this component:\n* Receptor utilizes QUIC a UDP based protocol which does not run over HTTP/2\n* Receptor utilizes the x/net/ipv4 and ipv6 packages, both of which are not affected",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45288"
},
{
"category": "external",
"summary": "RHBZ#2268273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288"
},
{
"category": "external",
"summary": "https://nowotarski.info/http2-continuation-flood/",
"url": "https://nowotarski.info/http2-continuation-flood/"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2687",
"url": "https://pkg.go.dev/vuln/GO-2024-2687"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/421644",
"url": "https://www.kb.cert.org/vuls/id/421644"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "In some environments where http/2 support is not required, it may be possible to disable this feature to reduce risk.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS"
},
{
"cve": "CVE-2023-45857",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-11-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2248979"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Axios that may expose a confidential session token. This issue can allow a remote attacker to bypass security measures and view sensitive data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: exposure of confidential data stored in cookies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected container was deprecated in ACM 2.5 version which is not anymore supported. Following versions of this product are not impacted by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45857"
},
{
"category": "external",
"summary": "RHBZ#2248979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857"
}
],
"release_date": "2023-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "axios: exposure of confidential data stored in cookies"
},
{
"cve": "CVE-2023-48631",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2254559"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in Adobe\u0027s css-tools when parsing CSS. This issue occurs due to improper input validation and may allow an attacker to use a carefully crafted input string to cause a denial of service, especially when attempting to parse CSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "css-tools: regular expression denial of service (ReDoS) when parsing CSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Regular Expression Denial of Service (ReDoS) vulnerability in css-tools, triggered by improper input validation when parsing CSS, is considered of moderate severity. While it can lead to a denial of service by causing the application to become unresponsive, the impact is limited to scenarios where an attacker can provide crafted input. Additionally, the absence of evidence of active exploitation in the wild and contextual factors, such as the software\u0027s usage, contribute to the moderate severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-48631"
},
{
"category": "external",
"summary": "RHBZ#2254559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-48631",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48631"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-48631",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48631"
},
{
"category": "external",
"summary": "https://github.com/adobe/css-tools/security/advisories/GHSA-prr3-c3m5-p7q2",
"url": "https://github.com/adobe/css-tools/security/advisories/GHSA-prr3-c3m5-p7q2"
}
],
"release_date": "2023-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "css-tools: regular expression denial of service (ReDoS) when parsing CSS"
},
{
"cve": "CVE-2024-24786",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2024-03-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2268046"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang\u0027s protobuf module, where the unmarshal function can enter an infinite loop when processing certain invalid inputs. This issue occurs during unmarshaling into a message that includes a google.protobuf.Any or when the UnmarshalOptions.DiscardUnknown option is enabled. This flaw allows an attacker to craft malicious input tailored to trigger the identified flaw in the unmarshal function. By providing carefully constructed invalid inputs, they could potentially cause the function to enter an infinite loop, resulting in a denial of service condition or other unintended behaviors in the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to ensure the most restrictive setting needed for operational requirements. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, enabling capabilities like excessive CPU usage, long execution times, or processes consuming abnormal amounts of memory. Static code analysis and peer code review techniques are used to execute robust input validation and error-handling mechanisms to ensure all user inputs are thoroughly validated, preventing infinite loops caused by malformed or unexpected input, such as unbounded user input or unexpected null values that cause loops to never terminate. In the event of successful exploitation, process isolation limits the effect of an infinite loop to a single process rather than allowing it to consume all system resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-24786"
},
{
"category": "external",
"summary": "RHBZ#2268046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786"
},
{
"category": "external",
"summary": "https://go.dev/cl/569356",
"url": "https://go.dev/cl/569356"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/",
"url": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-2611",
"url": "https://pkg.go.dev/vuln/GO-2024-2611"
}
],
"release_date": "2024-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-03-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2269576"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the follow-redirects package. While processing the cross-domain redirection, `follow-redirects` clears authorization headers, however, it misses clearing proxy-authentication headers, which contain credentials as well. This issue may lead to credential leaking, having a high impact on data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "follow-redirects: Possible credential leak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-28849"
},
{
"category": "external",
"summary": "RHBZ#2269576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2269576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849"
},
{
"category": "external",
"summary": "https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp",
"url": "https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp"
}
],
"release_date": "2024-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "follow-redirects: Possible credential leak"
},
{
"cve": "CVE-2024-29180",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2024-03-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270863"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webpack-dev-middleware package, where it failed to validate the supplied URL address sufficiently before returning local files. This flaw allows an attacker to craft URLs to return arbitrary local files from the developer\u0027s machine. The lack of normalization before calling the middleware also allows the attacker to perform path traversal attacks on the target environment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webpack-dev-middleware: lack of URL validation may lead to file leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability in webpack-dev represents a important security issue due to its potential to expose sensitive files and compromise developer machines. By failing to validate URLs and normalize paths effectively, the middleware allows attackers to craft malicious requests that can retrieve arbitrary local files or perform unauthorized path traversal. This could lead to unauthorized access to confidential information, including source code, configuration files, and even system-level files. Given the widespread use of webpack-dev-middleware in web development environments, addressing this vulnerability promptly is important to prevent serious data breaches and protect the integrity of development processes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"known_not_affected": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-29180"
},
{
"category": "external",
"summary": "RHBZ#2270863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-29180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29180"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29180",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29180"
},
{
"category": "external",
"summary": "https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6",
"url": "https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6"
}
],
"release_date": "2024-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-23T06:39:32+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64",
"9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64",
"9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64",
"9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64",
"9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64",
"9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64",
"9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webpack-dev-middleware: lack of URL validation may lead to file leak"
}
]
}
OPENSUSE-SU-2024:13569-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
rclone-1.65.1-1.1 on GA media
Notes
Title of the patch
rclone-1.65.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the rclone-1.65.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13569
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "rclone-1.65.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the rclone-1.65.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13569",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13569-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45286 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-48795 page",
"url": "https://www.suse.com/security/cve/CVE-2023-48795/"
}
],
"title": "rclone-1.65.1-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13569-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.65.1-1.1.aarch64",
"product": {
"name": "rclone-1.65.1-1.1.aarch64",
"product_id": "rclone-1.65.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.65.1-1.1.aarch64",
"product": {
"name": "rclone-bash-completion-1.65.1-1.1.aarch64",
"product_id": "rclone-bash-completion-1.65.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.65.1-1.1.aarch64",
"product": {
"name": "rclone-zsh-completion-1.65.1-1.1.aarch64",
"product_id": "rclone-zsh-completion-1.65.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.65.1-1.1.ppc64le",
"product": {
"name": "rclone-1.65.1-1.1.ppc64le",
"product_id": "rclone-1.65.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.65.1-1.1.ppc64le",
"product": {
"name": "rclone-bash-completion-1.65.1-1.1.ppc64le",
"product_id": "rclone-bash-completion-1.65.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.65.1-1.1.ppc64le",
"product": {
"name": "rclone-zsh-completion-1.65.1-1.1.ppc64le",
"product_id": "rclone-zsh-completion-1.65.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.65.1-1.1.s390x",
"product": {
"name": "rclone-1.65.1-1.1.s390x",
"product_id": "rclone-1.65.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.65.1-1.1.s390x",
"product": {
"name": "rclone-bash-completion-1.65.1-1.1.s390x",
"product_id": "rclone-bash-completion-1.65.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.65.1-1.1.s390x",
"product": {
"name": "rclone-zsh-completion-1.65.1-1.1.s390x",
"product_id": "rclone-zsh-completion-1.65.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.65.1-1.1.x86_64",
"product": {
"name": "rclone-1.65.1-1.1.x86_64",
"product_id": "rclone-1.65.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.65.1-1.1.x86_64",
"product": {
"name": "rclone-bash-completion-1.65.1-1.1.x86_64",
"product_id": "rclone-bash-completion-1.65.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.65.1-1.1.x86_64",
"product": {
"name": "rclone-zsh-completion-1.65.1-1.1.x86_64",
"product_id": "rclone-zsh-completion-1.65.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.65.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.65.1-1.1.aarch64"
},
"product_reference": "rclone-1.65.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.65.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.65.1-1.1.ppc64le"
},
"product_reference": "rclone-1.65.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.65.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.65.1-1.1.s390x"
},
"product_reference": "rclone-1.65.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.65.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.65.1-1.1.x86_64"
},
"product_reference": "rclone-1.65.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.65.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.aarch64"
},
"product_reference": "rclone-bash-completion-1.65.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.65.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.ppc64le"
},
"product_reference": "rclone-bash-completion-1.65.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.65.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.s390x"
},
"product_reference": "rclone-bash-completion-1.65.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.65.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.x86_64"
},
"product_reference": "rclone-bash-completion-1.65.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.65.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.aarch64"
},
"product_reference": "rclone-zsh-completion-1.65.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.65.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.ppc64le"
},
"product_reference": "rclone-zsh-completion-1.65.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.65.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.s390x"
},
"product_reference": "rclone-zsh-completion-1.65.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.65.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.x86_64"
},
"product_reference": "rclone-zsh-completion-1.65.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45286",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45286"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rclone-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45286",
"url": "https://www.suse.com/security/cve/CVE-2023-45286"
},
{
"category": "external",
"summary": "SUSE Bug 1217625 for CVE-2023-45286",
"url": "https://bugzilla.suse.com/1217625"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rclone-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:rclone-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-45286"
},
{
"cve": "CVE-2023-48795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-48795"
}
],
"notes": [
{
"category": "general",
"text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rclone-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-48795",
"url": "https://www.suse.com/security/cve/CVE-2023-48795"
},
{
"category": "external",
"summary": "SUSE Bug 1217950 for CVE-2023-48795",
"url": "https://bugzilla.suse.com/1217950"
},
{
"category": "external",
"summary": "SUSE Bug 1218708 for CVE-2023-48795",
"url": "https://bugzilla.suse.com/1218708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rclone-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:rclone-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.65.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.65.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.65.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-48795"
}
]
}
GSD-2023-45286
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2023-45286",
"id": "GSD-2023-45286"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-45286"
],
"details": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.",
"id": "GSD-2023-45286",
"modified": "2023-12-13T01:20:38.301205Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@golang.org",
"ID": "CVE-2023-45286",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "github.com/go-resty/resty/v2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "2.10.0",
"version_value": "2.11.0"
}
]
}
}
]
},
"vendor_name": "github.com/go-resty/resty/v2"
}
]
}
},
"credits": [
{
"lang": "en",
"value": "Logan Attwood (@lattwood)"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/go-resty/resty/issues/743",
"refsource": "MISC",
"url": "https://github.com/go-resty/resty/issues/743"
},
{
"name": "https://github.com/go-resty/resty/issues/739",
"refsource": "MISC",
"url": "https://github.com/go-resty/resty/issues/739"
},
{
"name": "https://github.com/go-resty/resty/pull/745",
"refsource": "MISC",
"url": "https://github.com/go-resty/resty/pull/745"
},
{
"name": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e",
"refsource": "MISC",
"url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e"
},
{
"name": "https://pkg.go.dev/vuln/GO-2023-2328",
"refsource": "MISC",
"url": "https://pkg.go.dev/vuln/GO-2023-2328"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:resty_project:resty:*:*:*:*:*:go:*:*",
"matchCriteriaId": "433974E8-CB64-4BBB-BB5A-9F072275B86F",
"versionEndIncluding": "2.10.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body."
},
{
"lang": "es",
"value": "Una condici\u00f3n de ejecuci\u00f3n en go-resty puede dar como resultado la divulgaci\u00f3n del cuerpo de la solicitud HTTP entre solicitudes. Esta condici\u00f3n se puede desencadenar llamando a sync.Pool.Put con el mismo *bytes.Buffer m\u00e1s de una vez, cuando los reintentos de solicitud est\u00e1n habilitados y se produce un reintento. La llamada a sync.Pool.Get devolver\u00e1 un bytes.Buffer al que no se le ha llamado bytes.Buffer.Reset. Este b\u00fafer sucio contendr\u00e1 el cuerpo de la solicitud HTTP de una solicitud no relacionada, y go-resty le agregar\u00e1 el cuerpo de la solicitud HTTP actual, enviando dos cuerpos en una solicitud. El sync.Pool en cuesti\u00f3n se define a nivel de paquete, por lo que un servidor completamente ajeno podr\u00eda recibir el cuerpo de la solicitud."
}
],
"id": "CVE-2023-45286",
"lastModified": "2024-01-04T19:15:08.737",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-11-28T17:15:08.280",
"references": [
{
"source": "security@golang.org",
"url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e"
},
{
"source": "security@golang.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/go-resty/resty/issues/739"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/go-resty/resty/issues/743"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/go-resty/resty/pull/745"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2023-2328"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
GHSA-XWH9-GC39-5298
Vulnerability from github – Published: 2023-11-28 17:36 – Updated: 2024-05-20 21:58
VLAI?
Summary
github.com/go-resty/resty/v2 HTTP request body disclosure
Details
A race condition in go-resty can result in HTTP request body disclosure across requests.
This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request.
The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.
Severity ?
5.9 (Medium)
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/go-resty/resty/v2"
},
"ranges": [
{
"events": [
{
"introduced": "2.10.0"
},
{
"fixed": "2.11.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2023-45286"
],
"database_specific": {
"cwe_ids": [
"CWE-200",
"CWE-362"
],
"github_reviewed": true,
"github_reviewed_at": "2023-11-28T17:36:21Z",
"nvd_published_at": "2023-11-28T17:15:08Z",
"severity": "MODERATE"
},
"details": "A race condition in go-resty can result in HTTP request body disclosure across requests.\n\nThis condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request.\n\nThe sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.",
"id": "GHSA-xwh9-gc39-5298",
"modified": "2024-05-20T21:58:12Z",
"published": "2023-11-28T17:36:21Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45286"
},
{
"type": "WEB",
"url": "https://github.com/go-resty/resty/issues/739"
},
{
"type": "WEB",
"url": "https://github.com/go-resty/resty/issues/743"
},
{
"type": "WEB",
"url": "https://github.com/go-resty/resty/pull/745"
},
{
"type": "WEB",
"url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e"
},
{
"type": "PACKAGE",
"url": "https://github.com/go-resty/resty"
},
{
"type": "WEB",
"url": "https://github.com/go-resty/resty/releases/tag/v2.11.0"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2023-2328"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "github.com/go-resty/resty/v2 HTTP request body disclosure"
}
MSRC_CVE-2023-45286
Vulnerability from csaf_microsoft - Published: 2023-11-01 07:00 - Updated: 2023-12-04 00:00Summary
HTTP request body disclosure in github.com/go-resty/resty/v2
Notes
Additional Resources
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer
The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45286 HTTP request body disclosure in github.com/go-resty/resty/v2 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-45286.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "HTTP request body disclosure in github.com/go-resty/resty/v2",
"tracking": {
"current_release_date": "2023-12-04T00:00:00.000Z",
"generator": {
"date": "2025-10-20T00:47:01.419Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-45286",
"initial_release_date": "2023-11-01T07:00:00.000Z",
"revision_history": [
{
"date": "2023-12-04T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 packer 1.8.7-1",
"product": {
"name": "\u003ccbl2 packer 1.8.7-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 packer 1.8.7-1",
"product": {
"name": "cbl2 packer 1.8.7-1",
"product_id": "18245"
}
}
],
"category": "product_name",
"name": "packer"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 packer 1.8.7-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 packer 1.8.7-1 as a component of CBL Mariner 2.0",
"product_id": "18245-17086"
},
"product_reference": "18245",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45286",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "general",
"text": "Go",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18245-17086"
],
"known_affected": [
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45286 HTTP request body disclosure in github.com/go-resty/resty/v2 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-45286.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-04T00:00:00.000Z",
"details": "1.8.7-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"17086-1"
]
}
],
"title": "HTTP request body disclosure in github.com/go-resty/resty/v2"
}
]
}
FKIE_CVE-2023-45286
Vulnerability from fkie_nvd - Published: 2023-11-28 17:15 - Updated: 2024-11-21 08:26
Severity ?
Summary
A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| resty_project | resty | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:resty_project:resty:*:*:*:*:*:go:*:*",
"matchCriteriaId": "433974E8-CB64-4BBB-BB5A-9F072275B86F",
"versionEndIncluding": "2.10.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body."
},
{
"lang": "es",
"value": "Una condici\u00f3n de ejecuci\u00f3n en go-resty puede dar como resultado la divulgaci\u00f3n del cuerpo de la solicitud HTTP entre solicitudes. Esta condici\u00f3n se puede desencadenar llamando a sync.Pool.Put con el mismo *bytes.Buffer m\u00e1s de una vez, cuando los reintentos de solicitud est\u00e1n habilitados y se produce un reintento. La llamada a sync.Pool.Get devolver\u00e1 un bytes.Buffer al que no se le ha llamado bytes.Buffer.Reset. Este b\u00fafer sucio contendr\u00e1 el cuerpo de la solicitud HTTP de una solicitud no relacionada, y go-resty le agregar\u00e1 el cuerpo de la solicitud HTTP actual, enviando dos cuerpos en una solicitud. El sync.Pool en cuesti\u00f3n se define a nivel de paquete, por lo que un servidor completamente ajeno podr\u00eda recibir el cuerpo de la solicitud."
}
],
"id": "CVE-2023-45286",
"lastModified": "2024-11-21T08:26:42.103",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-11-28T17:15:08.280",
"references": [
{
"source": "security@golang.org",
"url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e"
},
{
"source": "security@golang.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/go-resty/resty/issues/739"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/go-resty/resty/issues/743"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/go-resty/resty/pull/745"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2023-2328"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/go-resty/resty/issues/739"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/go-resty/resty/issues/743"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/go-resty/resty/pull/745"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2023-2328"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
WID-SEC-W-2024-1226
Vulnerability from csaf_certbund - Published: 2024-05-22 22:00 - Updated: 2025-05-15 22:00Summary
Red Hat OpenShift: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern oder um weitere nicht spezifizierte Angriffe auszuführen.
Betroffene Betriebssysteme
- Linux
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1226 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1226.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1226 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1226"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2874 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2874"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2929 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2929"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2930 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2930"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2932 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2932"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2933 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2933"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2874 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2901 vom 2024-05-23",
"url": "https://access.redhat.com/errata/RHSA-2024:2901"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3473 vom 2024-05-29",
"url": "https://access.redhat.com/errata/RHSA-2024:3473"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3790 vom 2024-06-11",
"url": "https://access.redhat.com/errata/RHSA-2024:3790"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3715 vom 2024-06-12",
"url": "https://access.redhat.com/errata/RHSA-2024:3715"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3314 vom 2024-06-13",
"url": "https://access.redhat.com/errata/RHSA-2024:3314"
},
{
"category": "external",
"summary": "RedHat Security Advisory",
"url": "https://access.redhat.com/errata/RHSA-2024:3919"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:3830 vom 2024-06-14",
"url": "https://errata.build.resf.org/RLSA-2024:3830"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:3827 vom 2024-06-14",
"url": "https://errata.build.resf.org/RLSA-2024:3827"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3868 vom 2024-06-17",
"url": "https://access.redhat.com/errata/RHSA-2024:3868"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:3826 vom 2024-06-14",
"url": "https://errata.build.resf.org/RLSA-2024:3826"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3889 vom 2024-06-19",
"url": "https://access.redhat.com/errata/RHSA-2024:3889"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3989 vom 2024-06-20",
"url": "https://access.redhat.com/errata/RHSA-2024:3989"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4163 vom 2024-06-27",
"url": "https://access.redhat.com/errata/RHSA-2024:4163"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3637 vom 2024-07-01",
"url": "https://access.redhat.com/errata/RHSA-2024:3637"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1616 vom 2024-07-01",
"url": "https://access.redhat.com/errata/RHSA-2024:1616"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3617 vom 2024-07-01",
"url": "https://access.redhat.com/errata/RHSA-2024:3617"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4269 vom 2024-07-03",
"url": "https://access.redhat.com/errata/RHSA-2024:4269"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4553 vom 2024-07-16",
"url": "https://access.redhat.com/errata/RHSA-2024:4553"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4699 vom 2024-07-25",
"url": "https://access.redhat.com/errata/RHSA-2024:4699"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4455 vom 2024-07-29",
"url": "https://access.redhat.com/errata/RHSA-2024:4455"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASDOCKER-2024-041 vom 2024-08-13",
"url": "https://alas.aws.amazon.com/AL2/ALASDOCKER-2024-041.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5422 vom 2024-08-20",
"url": "https://access.redhat.com/errata/RHSA-2024:5422"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5745 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5745"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6667 vom 2024-09-13",
"url": "https://access.redhat.com/errata/RHSA-2024:6667"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6755 vom 2024-09-18",
"url": "https://access.redhat.com/errata/RHSA-2024:6755"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7164 vom 2024-09-26",
"url": "https://access.redhat.com/errata/RHSA-2024:7164"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7184 vom 2024-10-03",
"url": "https://access.redhat.com/errata/RHSA-2024:7184"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23",
"url": "https://access.redhat.com/errata/RHSA-2024:8318"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8676 vom 2024-10-30",
"url": "https://access.redhat.com/errata/RHSA-2024:8676"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8677 vom 2024-10-30",
"url": "https://access.redhat.com/errata/RHSA-2024:8677"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8688 vom 2024-11-06",
"url": "https://access.redhat.com/errata/RHSA-2024:8688"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8692 vom 2024-11-07",
"url": "https://access.redhat.com/errata/RHSA-2024:8692"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9088 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9088"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7121-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0164 vom 2025-01-09",
"url": "https://access.redhat.com/errata/RHSA-2025:0164"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0323 vom 2025-01-15",
"url": "https://access.redhat.com/errata/RHSA-2025:0323"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0664 vom 2025-01-23",
"url": "https://access.redhat.com/errata/RHSA-2025:0664"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0832 vom 2025-02-06",
"url": "https://access.redhat.com/errata/RHSA-2025:0832"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2876 vom 2025-03-17",
"url": "https://access.redhat.com/errata/RHSA-2025:2876"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7753 vom 2025-05-16",
"url": "https://access.redhat.com/errata/RHSA-2025:7753"
}
],
"source_lang": "en-US",
"title": "Red Hat OpenShift: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-05-15T22:00:00.000+00:00",
"generator": {
"date": "2025-05-16T07:44:20.101+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-1226",
"initial_release_date": "2024-05-22T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-05-22T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-05-23T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-10T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-11T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-13T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-16T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2024-06-18T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-19T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-27T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-30T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-02T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-15T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-25T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-29T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-08-20T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-21T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-12T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-18T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-25T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-03T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-23T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-08T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-23T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-05T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-16T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-15T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "33"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "Advanced Cluster Security for Kubernetes 4",
"product": {
"name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4",
"product_id": "T033787",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "T035142",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T038901",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "Secondary Scheduler Operator",
"product": {
"name": "Red Hat OpenShift Secondary Scheduler Operator",
"product_id": "T027759",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:::secondary_scheduler_operator"
}
}
},
{
"category": "product_version",
"name": "Kube Descheduler Operator 5",
"product": {
"name": "Red Hat OpenShift Kube Descheduler Operator 5",
"product_id": "T033270",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:kube_descheduler_operator_5"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift",
"product": {
"name": "Red Hat OpenShift",
"product_id": "T035034",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:-"
}
}
},
{
"category": "product_version_range",
"name": "Migration Toolkit for Applications \u003c7.0.3",
"product": {
"name": "Red Hat OpenShift Migration Toolkit for Applications \u003c7.0.3",
"product_id": "T035036"
}
},
{
"category": "product_version",
"name": "Migration Toolkit for Applications 7.0.3",
"product": {
"name": "Red Hat OpenShift Migration Toolkit for Applications 7.0.3",
"product_id": "T035036-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:migration_toolkit_for_applications__7.0.3"
}
}
},
{
"category": "product_version",
"name": "Custom Metric Autoscaler 2",
"product": {
"name": "Red Hat OpenShift Custom Metric Autoscaler 2",
"product_id": "T035047",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:custom_metric_autoscaler_2"
}
}
},
{
"category": "product_version",
"name": "Network Observability 1.6",
"product": {
"name": "Red Hat OpenShift Network Observability 1.6",
"product_id": "T035431",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:network_observability_1.6"
}
}
},
{
"category": "product_version",
"name": "GitOps 1.12",
"product": {
"name": "Red Hat OpenShift GitOps 1.12",
"product_id": "T035679",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:gitops_1.12"
}
}
},
{
"category": "product_version",
"name": "Run Once Duration Override Operator 1",
"product": {
"name": "Red Hat OpenShift Run Once Duration Override Operator 1",
"product_id": "T035698",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:run_once_duration_override_operator_1"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.16.8",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.16.8",
"product_id": "T036959"
}
},
{
"category": "product_version",
"name": "Container Platform 4.16.8",
"product": {
"name": "Red Hat OpenShift Container Platform 4.16.8",
"product_id": "T036959-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.16.8"
}
}
},
{
"category": "product_version_range",
"name": "for Windows Containers \u003c10.15.3",
"product": {
"name": "Red Hat OpenShift for Windows Containers \u003c10.15.3",
"product_id": "T036993"
}
},
{
"category": "product_version",
"name": "for Windows Containers 10.15.3",
"product": {
"name": "Red Hat OpenShift for Windows Containers 10.15.3",
"product_id": "T036993-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:for_windows_containers__10.15.3"
}
}
},
{
"category": "product_version",
"name": "CodeReady Workspaces",
"product": {
"name": "Red Hat OpenShift CodeReady Workspaces",
"product_id": "T037618",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:codeready_workspaces"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.38",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.38",
"product_id": "T037940"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.38",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.38",
"product_id": "T037940-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.38"
}
}
},
{
"category": "product_version_range",
"name": "Data Foundation \u003c4.14.13",
"product": {
"name": "Red Hat OpenShift Data Foundation \u003c4.14.13",
"product_id": "T040215"
}
},
{
"category": "product_version",
"name": "Data Foundation 4.14.13",
"product": {
"name": "Red Hat OpenShift Data Foundation 4.14.13",
"product_id": "T040215-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:data_foundation__4.14.13"
}
}
},
{
"category": "product_version_range",
"name": "Serverless Logic \u003c1.35.0",
"product": {
"name": "Red Hat OpenShift Serverless Logic \u003c1.35.0",
"product_id": "T040597"
}
},
{
"category": "product_version",
"name": "Serverless Logic 1.35.0",
"product": {
"name": "Red Hat OpenShift Serverless Logic 1.35.0",
"product_id": "T040597-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:serverless_logic__1.35.0"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.12.72",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.12.72",
"product_id": "T040822"
}
},
{
"category": "product_version",
"name": "Container Platform 4.12.72",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12.72",
"product_id": "T040822-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.12.72"
}
}
},
{
"category": "product_version_range",
"name": "GitOps \u003c1.15.2",
"product": {
"name": "Red Hat OpenShift GitOps \u003c1.15.2",
"product_id": "T043834"
}
},
{
"category": "product_version",
"name": "GitOps 1.15.2",
"product": {
"name": "Red Hat OpenShift GitOps 1.15.2",
"product_id": "T043834-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:gitops__1.15.2"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26555",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2020-26555"
},
{
"cve": "CVE-2021-25220",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2021-25220"
},
{
"cve": "CVE-2021-29390",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2021-29390"
},
{
"cve": "CVE-2021-43618",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2021-43618"
},
{
"cve": "CVE-2022-0480",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-0480"
},
{
"cve": "CVE-2022-2795",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-2795"
},
{
"cve": "CVE-2022-3094",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-3094"
},
{
"cve": "CVE-2022-38096",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-38096"
},
{
"cve": "CVE-2022-40090",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-40090"
},
{
"cve": "CVE-2022-45934",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-45934"
},
{
"cve": "CVE-2022-48554",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-48554"
},
{
"cve": "CVE-2022-48624",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-48624"
},
{
"cve": "CVE-2023-24023",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-24023"
},
{
"cve": "CVE-2023-25193",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-25193"
},
{
"cve": "CVE-2023-25775",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-25775"
},
{
"cve": "CVE-2023-26159",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-26159"
},
{
"cve": "CVE-2023-26364",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-26364"
},
{
"cve": "CVE-2023-28322",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-28464",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-28464"
},
{
"cve": "CVE-2023-28866",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-28866"
},
{
"cve": "CVE-2023-2975",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-31083",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-31083"
},
{
"cve": "CVE-2023-31122",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-31122"
},
{
"cve": "CVE-2023-3446",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3567",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-3567"
},
{
"cve": "CVE-2023-3618",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-3618"
},
{
"cve": "CVE-2023-37453",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-37453"
},
{
"cve": "CVE-2023-3817",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-38469",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-38469"
},
{
"cve": "CVE-2023-38470",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-38470"
},
{
"cve": "CVE-2023-38471",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-38471"
},
{
"cve": "CVE-2023-38472",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-38472"
},
{
"cve": "CVE-2023-38473",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-38473"
},
{
"cve": "CVE-2023-38546",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-38546"
},
{
"cve": "CVE-2023-39189",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-39189"
},
{
"cve": "CVE-2023-39193",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-39193"
},
{
"cve": "CVE-2023-39194",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-39194"
},
{
"cve": "CVE-2023-39198",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-39198"
},
{
"cve": "CVE-2023-39326",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-39326"
},
{
"cve": "CVE-2023-40745",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-40745"
},
{
"cve": "CVE-2023-41175",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-41175"
},
{
"cve": "CVE-2023-4133",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-4133"
},
{
"cve": "CVE-2023-42754",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-42754"
},
{
"cve": "CVE-2023-42756",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-42756"
},
{
"cve": "CVE-2023-43785",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-43785"
},
{
"cve": "CVE-2023-43786",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-43786"
},
{
"cve": "CVE-2023-43787",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-43787"
},
{
"cve": "CVE-2023-43788",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-43788"
},
{
"cve": "CVE-2023-43789",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-43789"
},
{
"cve": "CVE-2023-4408",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-4408"
},
{
"cve": "CVE-2023-45286",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45286"
},
{
"cve": "CVE-2023-45287",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45287"
},
{
"cve": "CVE-2023-45288",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-45289",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45289"
},
{
"cve": "CVE-2023-45290",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45290"
},
{
"cve": "CVE-2023-45857",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45857"
},
{
"cve": "CVE-2023-45863",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45863"
},
{
"cve": "CVE-2023-46218",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46862",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-46862"
},
{
"cve": "CVE-2023-47038",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-47038"
},
{
"cve": "CVE-2023-48631",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-48631"
},
{
"cve": "CVE-2023-50387",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-50387"
},
{
"cve": "CVE-2023-50868",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2023-51043",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-51043"
},
{
"cve": "CVE-2023-51779",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-51779"
},
{
"cve": "CVE-2023-51780",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-51780"
},
{
"cve": "CVE-2023-52425",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52434",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52434"
},
{
"cve": "CVE-2023-52448",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52448"
},
{
"cve": "CVE-2023-52476",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52476"
},
{
"cve": "CVE-2023-52489",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52489"
},
{
"cve": "CVE-2023-52522",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52522"
},
{
"cve": "CVE-2023-52529",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52529"
},
{
"cve": "CVE-2023-52574",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52574"
},
{
"cve": "CVE-2023-52578",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52578"
},
{
"cve": "CVE-2023-52580",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52580"
},
{
"cve": "CVE-2023-52581",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52581"
},
{
"cve": "CVE-2023-52597",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52597"
},
{
"cve": "CVE-2023-52610",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52610"
},
{
"cve": "CVE-2023-52620",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52620"
},
{
"cve": "CVE-2023-5678",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-6040",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6040"
},
{
"cve": "CVE-2023-6121",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6121"
},
{
"cve": "CVE-2023-6129",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2023-6176",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6176"
},
{
"cve": "CVE-2023-6228",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6228"
},
{
"cve": "CVE-2023-6237",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6237"
},
{
"cve": "CVE-2023-6240",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6240"
},
{
"cve": "CVE-2023-6531",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6531"
},
{
"cve": "CVE-2023-6546",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6546"
},
{
"cve": "CVE-2023-6622",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6622"
},
{
"cve": "CVE-2023-6915",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6915"
},
{
"cve": "CVE-2023-6931",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6931"
},
{
"cve": "CVE-2023-6932",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6932"
},
{
"cve": "CVE-2023-7008",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-7008"
},
{
"cve": "CVE-2024-0565",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-0565"
},
{
"cve": "CVE-2024-0727",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-0841",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-0841"
},
{
"cve": "CVE-2024-1085",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-1085"
},
{
"cve": "CVE-2024-1086",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-1086"
},
{
"cve": "CVE-2024-1394",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-1394"
},
{
"cve": "CVE-2024-1488",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-1488"
},
{
"cve": "CVE-2024-21011",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-21011"
},
{
"cve": "CVE-2024-21012",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-21012"
},
{
"cve": "CVE-2024-21068",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-21068"
},
{
"cve": "CVE-2024-21085",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-21085"
},
{
"cve": "CVE-2024-21094",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-21094"
},
{
"cve": "CVE-2024-22365",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-22365"
},
{
"cve": "CVE-2024-24783",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-24783"
},
{
"cve": "CVE-2024-24784",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-24784"
},
{
"cve": "CVE-2024-24785",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-24785"
},
{
"cve": "CVE-2024-24786",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-24786"
},
{
"cve": "CVE-2024-25062",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-25062"
},
{
"cve": "CVE-2024-25742",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-25742"
},
{
"cve": "CVE-2024-25743",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-25743"
},
{
"cve": "CVE-2024-26582",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26582"
},
{
"cve": "CVE-2024-26583",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26583"
},
{
"cve": "CVE-2024-26584",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26584"
},
{
"cve": "CVE-2024-26585",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26585"
},
{
"cve": "CVE-2024-26586",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26586"
},
{
"cve": "CVE-2024-26593",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26593"
},
{
"cve": "CVE-2024-26602",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26602"
},
{
"cve": "CVE-2024-26609",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26609"
},
{
"cve": "CVE-2024-26633",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26633"
},
{
"cve": "CVE-2024-27316",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-27316"
},
{
"cve": "CVE-2024-28834",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-28834"
},
{
"cve": "CVE-2024-28835",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-28835"
},
{
"cve": "CVE-2024-28849",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29180",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-29180"
},
{
"cve": "CVE-2024-2961",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-33599",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"product_status": {
"known_affected": [
"T033787",
"T035679",
"T037618",
"T036959",
"T038901",
"67646",
"T040822",
"T035034",
"T036993",
"T037940",
"T035142",
"T035698",
"T032255",
"T035047",
"T035036",
"T035431",
"T027759",
"T033270",
"T000126",
"T043834",
"T040215",
"398363",
"T040597"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-33602"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…