Action not permitted
Modal body text goes here.
cve-2023-46129
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:37:39.393Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/31/1" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "nkeys", "vendor": "nats-io", "versions": [ { "status": "affected", "version": "\u003e= 2.10.0, \u003c 2.10.4" }, { "status": "affected", "version": "\u003e= 0.4.0, \u003c 0.4.6" } ] } ], "descriptions": [ { "lang": "en", "value": "NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-321", "description": "CWE-321: Use of Hard-coded Cryptographic Key", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-325", "description": "CWE-325: Missing Cryptographic Step", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-30T23:47:36.039Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9" }, { "url": "http://www.openwall.com/lists/oss-security/2023/10/31/1" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/" } ], "source": { "advisory": "GHSA-mr45-rx8q-wcm9", "discovery": "UNKNOWN" }, "title": "xkeys Seal encryption used fixed key for all encryption" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-46129", "datePublished": "2023-10-30T23:47:36.039Z", "dateReserved": "2023-10-16T17:51:35.573Z", "dateUpdated": "2024-08-02T20:37:39.393Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-46129\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-10-31T00:15:09.933\",\"lastModified\":\"2023-11-29T03:15:42.270\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \\nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep.\"},{\"lang\":\"es\",\"value\":\"NATS.io es una tecnolog\u00eda de comunicaci\u00f3n distribuida pub-sub de c\u00f3digo abierto de alto rendimiento, creada para la nube, local, IoT y computaci\u00f3n de borde. La librer\u00eda de manejo de claves criptogr\u00e1ficas, nkeys, recientemente obtuvo soporte para cifrado, no solo para firma/autenticaci\u00f3n. Esto se utiliza en nats-server 2.10 (septiembre de 2023) y versiones posteriores para llamadas de autenticaci\u00f3n. En las versiones 0.4.0 a 0.4.5 de nkeys, correspondientes a las versiones 2.10.0 a 2.10.3 del servidor NATS, la l\u00f3gica de manejo de cifrado `xkeys` de la librer\u00eda nkeys pas\u00f3 por error una matriz por valor a una funci\u00f3n interna, donde la funci\u00f3n mut\u00f3 ese b\u00fafer. para completar la clave de cifrado que se utilizar\u00e1. Como resultado, todo el cifrado se realiz\u00f3 en realidad con una clave de todos ceros. Esto afecta \u00fanicamente al cifrado, no a la firma. SOLUCI\u00d3N: COMPLETE EL IMPACTO EN LA SEGURIDAD DE LA LLAMADA DE AUTENCI\u00d3N DEL SERVIDOR NATS. La librer\u00eda nkeys Go 0.4.6, correspondiente a NATS Server 2.10.4, tiene un parche para este problema. No hay workarounds conocidos disponibles. Para cualquier aplicaci\u00f3n que maneje llamadas de autenticaci\u00f3n en Go, si usa la librer\u00eda nkeys, actualice la dependencia, vuelva a compilarla e implementarla al mismo tiempo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-321\"},{\"lang\":\"en\",\"value\":\"CWE-325\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nats:nats_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.10.0\",\"versionEndExcluding\":\"2.10.4\",\"matchCriteriaId\":\"BBB8F9C2-3395-4D22-BA0C-8462D6E076A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nats:nkeys:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.4.0\",\"versionEndExcluding\":\"0.4.6\",\"matchCriteriaId\":\"EBAF8F73-D62A-4371-916F-0296A4B975B5\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/31/1\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/\",\"source\":\"security-advisories@github.com\"}]}}" } }
gsd-2023-46129
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2023-46129", "id": "GSD-2023-46129" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-46129" ], "details": "NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep.", "id": "GSD-2023-46129", "modified": "2023-12-13T01:20:53.124887Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2023-46129", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "nkeys", "version": { "version_data": [ { "version_affected": "=", "version_value": "\u003e= 2.10.0, \u003c 2.10.4" }, { "version_affected": "=", "version_value": "\u003e= 0.4.0, \u003c 0.4.6" } ] } } ] }, "vendor_name": "nats-io" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep." } ] }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-321", "lang": "eng", "value": "CWE-321: Use of Hard-coded Cryptographic Key" } ] }, { "description": [ { "cweId": "CWE-325", "lang": "eng", "value": "CWE-325: Missing Cryptographic Step" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9", "refsource": "MISC", "url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9" }, { "name": "http://www.openwall.com/lists/oss-security/2023/10/31/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2023/10/31/1" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/" } ] }, "source": { "advisory": "GHSA-mr45-rx8q-wcm9", "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nats:nkeys:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.4.6", "versionStartIncluding": "0.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nats:nats_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.10.4", "versionStartIncluding": "2.10.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2023-46129" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-321" }, { "lang": "en", "value": "CWE-325" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9" }, { "name": "http://www.openwall.com/lists/oss-security/2023/10/31/1", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/31/1" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/", "refsource": "", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/", "refsource": "", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-11-29T03:15Z", "publishedDate": "2023-10-31T00:15Z" } } }
var-202310-1531
Vulnerability from variot
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library's xkeys
encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing.
FIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep. NATS of NATS Server and nkeys contains vulnerabilities related to the use of hard-coded encryption keys and vulnerabilities related to flaws in the encryption process.Information may be obtained
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202310-1531", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "server", "scope": "lt", "trust": 1.0, "vendor": "nats", "version": "2.10.4" }, { "model": "server", "scope": "gte", "trust": 1.0, "vendor": "nats", "version": "2.10.0" }, { "model": "nkeys", "scope": "lt", "trust": 1.0, "vendor": "nats", "version": "0.4.6" }, { "model": "nkeys", "scope": "gte", "trust": 1.0, "vendor": "nats", "version": "0.4.0" }, { "model": "nkeys", "scope": null, "trust": 0.8, "vendor": "nats", "version": null }, { "model": "server", "scope": null, "trust": 0.8, "vendor": "nats", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-015964" }, { "db": "NVD", "id": "CVE-2023-46129" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nats:nkeys:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.4.6", "versionStartIncluding": "0.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nats:nats_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.10.4", "versionStartIncluding": "2.10.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2023-46129" } ] }, "cve": "CVE-2023-46129", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2023-46129", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2023-46129", "trust": 1.8, "value": "HIGH" }, { "author": "security-advisories@github.com", "id": "CVE-2023-46129", "trust": 1.0, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-015964" }, { "db": "NVD", "id": "CVE-2023-46129" }, { "db": "NVD", "id": "CVE-2023-46129" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep. NATS of NATS Server and nkeys contains vulnerabilities related to the use of hard-coded encryption keys and vulnerabilities related to flaws in the encryption process.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2023-46129" }, { "db": "JVNDB", "id": "JVNDB-2023-015964" }, { "db": "VULMON", "id": "CVE-2023-46129" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-46129", "trust": 2.7 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2023/10/31/1", "trust": 1.9 }, { "db": "JVNDB", "id": "JVNDB-2023-015964", "trust": 0.8 }, { "db": "VULMON", "id": "CVE-2023-46129", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-46129" }, { "db": "JVNDB", "id": "JVNDB-2023-015964" }, { "db": "NVD", "id": "CVE-2023-46129" } ] }, "id": "VAR-202310-1531", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.22619048 }, "last_update_date": "2024-01-03T13:35:24.999000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Debian CVElist Bug Report Logs: golang-github-nats-io-nkeys: CVE-2023-46129", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=1b947156b93d5526f9c7f90eda21d808" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-46129" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-321", "trust": 1.0 }, { "problemtype": "CWE-325", "trust": 1.0 }, { "problemtype": "Using hardcoded encryption keys (CWE-321) [ others ]", "trust": 0.8 }, { "problemtype": " Inadequate encryption processing (CWE-325) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-015964" }, { "db": "NVD", "id": "CVE-2023-46129" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://github.com/nats-io/nkeys/security/advisories/ghsa-mr45-rx8q-wcm9" }, { "trust": 1.9, "url": "http://www.openwall.com/lists/oss-security/2023/10/31/1" }, { "trust": 1.8, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/r3uetkpub3v5js5tlzof3smtgt5k5aps/" }, { "trust": 1.8, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ulqqonmscqsh5z5owffqhcgez3nl4drj/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-46129" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/321.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/325.html" }, { "trust": 0.1, "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055010" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-46129" }, { "db": "JVNDB", "id": "JVNDB-2023-015964" }, { "db": "NVD", "id": "CVE-2023-46129" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2023-46129" }, { "db": "JVNDB", "id": "JVNDB-2023-015964" }, { "db": "NVD", "id": "CVE-2023-46129" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-10-31T00:00:00", "db": "VULMON", "id": "CVE-2023-46129" }, { "date": "2023-12-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-015964" }, { "date": "2023-10-31T00:15:09.933000", "db": "NVD", "id": "CVE-2023-46129" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-10-31T00:00:00", "db": "VULMON", "id": "CVE-2023-46129" }, { "date": "2023-12-28T06:13:00", "db": "JVNDB", "id": "JVNDB-2023-015964" }, { "date": "2023-11-29T03:15:42.270000", "db": "NVD", "id": "CVE-2023-46129" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NATS\u00a0 of \u00a0NATS\u00a0Server\u00a0 and \u00a0nkeys\u00a0 Vulnerability related to the use of hard-coded encryption keys in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-015964" } ], "trust": 0.8 } }
rhsa-2023_7663
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift distributed tracing 3.0.0\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Release of Red Hat OpenShift distributed tracing provides these changes:\n\nSecurity Fix(es):\n\nCVE-2023-45142 opentelemetry: DoS vulnerability in otelhttp\nCVE-2023-46129 nkeys: xkeys Seal encryption used fixed key for all encryption\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in the\nReferences section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:7663", "url": "https://access.redhat.com/errata/RHSA-2023:7663" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2245180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245180" }, { "category": "external", "summary": "2246986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246986" }, { "category": "external", "summary": "TRACING-1805", "url": "https://issues.redhat.com/browse/TRACING-1805" }, { "category": "external", "summary": "TRACING-3217", "url": "https://issues.redhat.com/browse/TRACING-3217" }, { "category": "external", "summary": "TRACING-3379", "url": "https://issues.redhat.com/browse/TRACING-3379" }, { "category": "external", "summary": "TRACING-3510", "url": "https://issues.redhat.com/browse/TRACING-3510" }, { "category": "external", "summary": "TRACING-3523", "url": "https://issues.redhat.com/browse/TRACING-3523" }, { "category": "external", "summary": "TRACING-3555", "url": "https://issues.redhat.com/browse/TRACING-3555" }, { "category": "external", "summary": "TRACING-3568", "url": "https://issues.redhat.com/browse/TRACING-3568" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7663.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.0.0 operator/operand containers", "tracking": { "current_release_date": "2024-11-06T04:29:25+00:00", "generator": { "date": "2024-11-06T04:29:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2023:7663", "initial_release_date": "2023-12-06T05:00:32+00:00", "revision_history": [ { "date": "2023-12-06T05:00:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-12-06T05:00:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T04:29:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift distributed tracing 3.0", "product": { "name": "Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift distributed tracing" }, { "branches": [ { "category": "product_version", "name": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64", "product": { "name": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64", "product_id": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64", "product": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64", "product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64", "product": { "name": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64", "product_id": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64", "product": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64", "product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64", "product": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64", "product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64", "product": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64", "product_id": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64", "product": { "name": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64", "product_id": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.51.0-14" } } }, { "category": "product_version", "name": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64", "product": { "name": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64", "product_id": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64", "product": { "name": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64", "product_id": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64", "product": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64", "product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.89.0-2" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64", "product": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64", "product_id": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.89.0-16" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64", "product": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64", "product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.89.0-3" } } }, { "category": "product_version", "name": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64", "product": { "name": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64", "product_id": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64", "product_identification_helper": { "purl": "pkg:oci/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.3.0-2" } } }, { "category": "product_version", "name": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64", "product": { "name": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64", "product_id": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64", "product_identification_helper": { "purl": "pkg:oci/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=0.1.2-19" } } }, { "category": "product_version", "name": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64", "product": { "name": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64", "product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64", "product_identification_helper": { "purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=13d8960-1" } } }, { "category": "product_version", "name": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64", "product": { "name": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64", "product_id": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64", "product_identification_helper": { "purl": "pkg:oci/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.6.0-15" } } }, { "category": "product_version", "name": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64", "product": { "name": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64", "product_id": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64", "product_identification_helper": { "purl": "pkg:oci/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.6.0-2" } } }, { "category": "product_version", "name": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64", "product": { "name": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64", "product_id": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64", "product_identification_helper": { "purl": "pkg:oci/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.6.0-3" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le", "product": { "name": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le", "product_id": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le", "product": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le", "product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le", "product": { "name": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le", "product_id": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le", "product": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le", "product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le", "product": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le", "product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le", "product": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le", "product_id": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le", "product": { "name": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le", "product_id": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.51.0-14" } } }, { "category": "product_version", "name": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le", "product": { "name": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le", "product_id": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le", "product": { "name": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le", "product_id": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le", "product": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le", "product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.89.0-2" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le", "product": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le", "product_id": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.89.0-16" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le", "product": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le", "product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.89.0-3" } } }, { "category": "product_version", "name": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le", "product": { "name": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le", "product_id": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le", "product_identification_helper": { "purl": "pkg:oci/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.3.0-2" } } }, { "category": "product_version", "name": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le", "product": { "name": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le", "product_id": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=0.1.2-19" } } }, { "category": "product_version", "name": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le", "product": { "name": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le", "product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le", "product_identification_helper": { "purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=13d8960-1" } } }, { "category": "product_version", "name": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le", "product": { "name": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le", "product_id": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le", "product_identification_helper": { "purl": "pkg:oci/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.6.0-15" } } }, { "category": "product_version", "name": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le", "product": { "name": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le", "product_id": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.6.0-2" } } }, { "category": "product_version", "name": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le", "product": { "name": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le", "product_id": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.6.0-3" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x", "product": { "name": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x", "product_id": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x", "product": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x", "product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x", "product": { "name": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x", "product_id": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x", "product": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x", "product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x", "product": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x", "product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x", "product": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x", "product_id": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x", "product": { "name": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x", "product_id": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.51.0-14" } } }, { "category": "product_version", "name": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x", "product": { "name": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x", "product_id": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x", "product": { "name": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x", "product_id": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x", "product": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x", "product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.89.0-2" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x", "product": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x", "product_id": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.89.0-16" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x", "product": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x", "product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.89.0-3" } } }, { "category": "product_version", "name": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x", "product": { "name": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x", "product_id": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x", "product_identification_helper": { "purl": "pkg:oci/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.3.0-2" } } }, { "category": "product_version", "name": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x", "product": { "name": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x", "product_id": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x", "product_identification_helper": { "purl": "pkg:oci/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=0.1.2-19" } } }, { "category": "product_version", "name": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x", "product": { "name": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x", "product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x", "product_identification_helper": { "purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=13d8960-1" } } }, { "category": "product_version", "name": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x", "product": { "name": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x", "product_id": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x", "product_identification_helper": { "purl": "pkg:oci/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.6.0-15" } } }, { "category": "product_version", "name": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x", "product": { "name": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x", "product_id": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x", "product_identification_helper": { "purl": "pkg:oci/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.6.0-2" } } }, { "category": "product_version", "name": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x", "product": { "name": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x", "product_id": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x", "product_identification_helper": { "purl": "pkg:oci/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.6.0-3" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64", "product": { "name": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64", "product_id": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64", "product": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64", "product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64", "product": { "name": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64", "product_id": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64", "product": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64", "product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64", "product": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64", "product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64", "product": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64", "product_id": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64", "product": { "name": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64", "product_id": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64", "product_identification_helper": { "purl": "pkg:oci/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.51.0-14" } } }, { "category": "product_version", "name": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64", "product": { "name": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64", "product_id": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64", "product": { "name": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64", "product_id": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.51.0-1" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64", "product": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64", "product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.89.0-2" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64", "product": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64", "product_id": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.89.0-16" } } }, { "category": "product_version", "name": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64", "product": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64", "product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.89.0-3" } } }, { "category": "product_version", "name": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64", "product": { "name": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64", "product_id": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64", "product_identification_helper": { "purl": "pkg:oci/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.3.0-2" } } }, { "category": "product_version", "name": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64", "product": { "name": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64", "product_id": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64", "product_identification_helper": { "purl": "pkg:oci/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=0.1.2-19" } } }, { "category": "product_version", "name": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64", "product": { "name": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64", "product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64", "product_identification_helper": { "purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=13d8960-1" } } }, { "category": "product_version", "name": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64", "product": { "name": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64", "product_id": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64", "product_identification_helper": { "purl": "pkg:oci/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.6.0-15" } } }, { "category": "product_version", "name": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64", "product": { "name": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64", "product_id": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64", "product_identification_helper": { "purl": "pkg:oci/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.6.0-2" } } }, { "category": "product_version", "name": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64", "product": { "name": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64", "product_id": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64", "product_identification_helper": { "purl": "pkg:oci/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.6.0-3" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x" }, "product_reference": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64" }, "product_reference": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le" }, "product_reference": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64" }, "product_reference": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64" }, "product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x" }, "product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le" }, "product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64" }, "product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64" }, "product_reference": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x" }, "product_reference": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64" }, "product_reference": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le" }, "product_reference": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le" }, "product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x" }, "product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64" }, "product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64" }, "product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64" }, "product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64" }, "product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le" }, "product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x" }, "product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64" }, "product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le" }, "product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64" }, "product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x" }, "product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le" }, "product_reference": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64" }, "product_reference": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x" }, "product_reference": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64" }, "product_reference": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x" }, "product_reference": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64" }, "product_reference": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le" }, "product_reference": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64" }, "product_reference": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x" }, "product_reference": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64" }, "product_reference": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64" }, "product_reference": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le" }, "product_reference": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64" }, "product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64" }, "product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le" }, "product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x" }, "product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x" }, "product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le" }, "product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64" }, "product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64" }, "product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x" }, "product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64" }, "product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64" }, "product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le" }, "product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x" }, "product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64" }, "product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le" }, "product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64" }, "product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le" }, "product_reference": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x" }, "product_reference": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64" }, "product_reference": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64" }, "product_reference": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le" }, "product_reference": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64" }, "product_reference": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x" }, "product_reference": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64" }, "product_reference": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64" }, "product_reference": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64" }, "product_reference": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x" }, "product_reference": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le" }, "product_reference": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x" }, "product_reference": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64" }, "product_reference": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64" }, "product_reference": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le" }, "product_reference": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le" }, "product_reference": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64" }, "product_reference": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x" }, "product_reference": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x", "relates_to_product_reference": "8Base-RHOSDT-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64 as a component of Red Hat OpenShift distributed tracing 3.0", "product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64" }, "product_reference": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64", "relates_to_product_reference": "8Base-RHOSDT-3.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45142", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2023-10-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2245180" } ], "notes": [ { "category": "description", "text": "A memory leak was found in the otelhttp handler of open-telemetry. This flaw allows a remote, unauthenticated attacker to exhaust the server\u0027s memory by sending many malicious requests, affecting the availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "opentelemetry: DoS vulnerability in otelhttp", "title": "Vulnerability summary" }, { "category": "other", "text": "While no authentication is required, there are a significant number of non-default factors which prevent widespread exploitation of this flaw. For a service to be affected, all of the following must be true:\n* The go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp package must be in use\n* Configured a metrics pipeline which uses the otelhttp.NewHandler wrapper function\n* No filtering of unknown HTTP methods or user agents at a higher level (such as Content Delivery Network/Load Balancer/etc...)\n\nDue to the limited attack surface, Red Hat Product Security rates the impact as Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64" ], "known_not_affected": [ "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45142" }, { "category": "external", "summary": "RHBZ#2245180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245180" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45142", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45142" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45142", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45142" }, { "category": "external", "summary": "https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr", "url": "https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr" } ], "release_date": "2023-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-12-06T05:00:32+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7663" }, { "category": "workaround", "details": "As a workaround to stop being affected otelhttp.WithFilter() can be used.\n\nFor convenience and safe usage of this library, it should by default mark with the label unknown non-standard HTTP methods and User agents to show that such requests were made but do not increase cardinality. In case someone wants to stay with the current behavior, library API should allow to enable it.\n\nThe other possibility is to disable HTTP metrics instrumentation by passing otelhttp.WithMeterProvider option with noop.NewMeterProvider.", "product_ids": [ "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "opentelemetry: DoS vulnerability in otelhttp" }, { "cve": "CVE-2023-46129", "cwe": { "id": "CWE-325", "name": "Missing Cryptographic Step" }, "discovery_date": "2023-10-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2246986" } ], "notes": [ { "category": "description", "text": "A flaw was found in nkeys. The nkeys library\u0027s \"xkeys\" encryption handling logic, mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was using an all-zeros key.", "title": "Vulnerability description" }, { "category": "summary", "text": "nkeys: xkeys Seal encryption used fixed key for all encryption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64" ], "known_not_affected": [ "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le", "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64", "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64", "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-46129" }, { "category": "external", "summary": "RHBZ#2246986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246986" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-46129", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-46129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46129" }, { "category": "external", "summary": "https://advisories.nats.io/CVE/secnote-2023-02.txt", "url": "https://advisories.nats.io/CVE/secnote-2023-02.txt" }, { "category": "external", "summary": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9", "url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9" } ], "release_date": "2023-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-12-06T05:00:32+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7663" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64", "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nkeys: xkeys Seal encryption used fixed key for all encryption" } ] }
wid-sec-w-2023-3067
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und um Sicherheitsmechanismen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-3067 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-3067.json" }, { "category": "self", "summary": "WID-SEC-2023-3067 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3067" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7681 vom 2023-12-12", "url": "https://access.redhat.com/errata/RHSA-2023:7681" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7682 vom 2023-12-12", "url": "https://access.redhat.com/errata/RHSA-2023:7682" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7198 vom 2024-02-28", "url": "https://access.redhat.com/errata/RHSA-2023:7198" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7197 vom 2024-02-28", "url": "https://access.redhat.com/errata/RHSA-2023:7197" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2446 vom 2024-02-06", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2446.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0833 vom 2024-02-21", "url": "https://access.redhat.com/errata/RHSA-2024:0833" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0641 vom 2024-02-07", "url": "https://access.redhat.com/errata/RHSA-2024:0641" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0660 vom 2024-02-07", "url": "https://access.redhat.com/errata/RHSA-2024:0660" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0642 vom 2024-02-07", "url": "https://access.redhat.com/errata/RHSA-2024:0642" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0204 vom 2024-01-20", "url": "https://access.redhat.com/errata/RHSA-2024:0204" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7831 vom 2024-01-04", "url": "https://access.redhat.com/errata/RHSA-2023:7831" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7663 vom 2023-12-06", "url": "https://access.redhat.com/errata/RHSA-2023:7663" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1859 vom 2024-04-16", "url": "https://access.redhat.com/errata/RHSA-2024:1859" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2773 vom 2024-05-15", "url": "https://access.redhat.com/errata/RHSA-2024:2773" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-15T22:00:00.000+00:00", "generator": { "date": "2024-05-16T08:04:30.052+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-3067", "initial_release_date": "2023-12-05T23:00:00.000+00:00", "revision_history": [ { "date": "2023-12-05T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-12-12T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-03T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-21T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-02-05T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-02-07T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-02-20T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-02-27T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-04-16T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-15T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "10" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version", "name": "distributed tracing 3", "product": { "name": "Red Hat OpenShift distributed tracing 3", "product_id": "T031493", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:distributed_tracing_3" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.14.7", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.7", "product_id": "T031849", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.7" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45142", "notes": [ { "category": "description", "text": "In Red Hat OpenShift besteht eine Schwachstelle aufgrund eines Speicherlecks im \"otelhttp handler\" von \"open-telemetry\". Ein Angreifer kann dies f\u00fcr einen Denial-of-Service-Angriff ausnutzen, indem er viele speziell gestaltete Anfragen sendet." } ], "product_status": { "known_affected": [ "67646", "398363", "T031849", "T031493" ] }, "release_date": "2023-12-05T23:00:00Z", "title": "CVE-2023-45142" }, { "cve": "CVE-2023-46129", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat OpenShift, in Bezug auf die \"nkeys\"-Bibliothek. Ein Implementierungsfehler in der Verschl\u00fcsselungslogik von \"xkeys\" f\u00fchrt zu \"all-zeros\"-Verschl\u00fcsselungsschl\u00fcsseln. Ein Angreifer kann dies ausnutzen, um Sicherheitsmechanismen zu umgehen." } ], "product_status": { "known_affected": [ "67646", "398363", "T031849", "T031493" ] }, "release_date": "2023-12-05T23:00:00Z", "title": "CVE-2023-46129" } ] }
ghsa-mr45-rx8q-wcm9
Vulnerability from github
Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts.
Problem Description
The nkeys library's "xkeys" encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key.
This affects encryption only, not signing.
FIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY.
Affected versions
nkeys Go library: * 0.4.0 up to and including 0.4.5 * Fixed with nats-io/nkeys: 0.4.6
NATS Server: * 2.10.0 up to and including 2.10.3 * Fixed with nats-io/nats-server: 2.10.4
Solution
Upgrade the nats-server.
For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep.
Credits
Problem reported by Quentin Matillat (GitHub @tinou98).
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 0.4.5" }, "package": { "ecosystem": "Go", "name": "github.com/nats-io/nkeys" }, "ranges": [ { "events": [ { "introduced": "0.4.0" }, { "fixed": "0.4.6" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 2.10.3" }, "package": { "ecosystem": "Go", "name": "github.com/nats-io/nats-server/v2" }, "ranges": [ { "events": [ { "introduced": "2.10.0" }, { "fixed": "2.10.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-46129" ], "database_specific": { "cwe_ids": [ "CWE-321", "CWE-325" ], "github_reviewed": true, "github_reviewed_at": "2023-10-31T21:19:02Z", "nvd_published_at": "2023-10-31T00:15:09Z", "severity": "HIGH" }, "details": "## Background\n\nNATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.\n\nThe cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts.\n\n## Problem Description\n\nThe nkeys library\u0027s \"xkeys\" encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key.\n\nThis affects encryption only, not signing. \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY.\n\n## Affected versions\n\nnkeys Go library:\n * 0.4.0 up to and including 0.4.5\n * Fixed with nats-io/nkeys: 0.4.6\n\nNATS Server:\n * 2.10.0 up to and including 2.10.3\n * Fixed with nats-io/nats-server: 2.10.4\n\n## Solution\n\nUpgrade the nats-server. \nFor any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep.\n\n## Credits\n\nProblem reported by Quentin Matillat (GitHub @tinou98).", "id": "GHSA-mr45-rx8q-wcm9", "modified": "2023-10-31T21:19:02Z", "published": "2023-10-31T21:19:02Z", "references": [ { "type": "WEB", "url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46129" }, { "type": "WEB", "url": "https://github.com/nats-io/nkeys/commit/58fb9d69f42ea73fffad1d14e5914dc666f3daa1" }, { "type": "PACKAGE", "url": "https://github.com/nats-io/nkeys" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/10/31/1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "xkeys seal encryption used fixed key for all encryption" }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.