Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:4986 - Security Advisory
Issued:
2023-09-06
Updated:
2023-09-06

RHSA-2023:4986 - Security Advisory

  • Overview
  • Updated Images

Synopsis

Moderate: Red Hat OpenShift Distributed Tracing 2.9.0 security update

Type/Severity

Security Advisory: Moderate

Topic

Updated Red Hat OpenShift Distributed Tracing 2.9 container images are now available.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The Red Hat OpenShift Distributed Tracing 2.9 container images have been released.

Users of Red Hat OpenShift Distributed Tracing 2.8 container images are advised to upgrade to these updated images, which contain backported patches to correct security issues, fix bugs, and include further enhancements.

You can find images updated by this advisory in Red Hat Container Catalog (see References).

Security Fix(es):

  • golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)
  • golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)
  • golang: go/parser: Infinite loop in parsing (CVE-2023-24537)
  • golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs.

Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

Affected Products

  • Red Hat OpenShift distributed tracing 2 x86_64
  • Red Hat OpenShift distributed tracing for Power, little endian 2 ppc64le
  • Red Hat OpenShift distributed tracing for IBM Z and LinuxONE 2 s390x

Fixes

  • BZ - 2184481 - CVE-2023-24538 golang: html/template: backticks not treated as string delimiters
  • BZ - 2184482 - CVE-2023-24536 golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption
  • BZ - 2184483 - CVE-2023-24534 golang: net/http, net/textproto: denial of service from excessive memory allocation
  • BZ - 2184484 - CVE-2023-24537 golang: go/parser: Infinite loop in parsing
  • TRACING-2968 - Wrong port is exposed for jaeger-production-query resulting in connection refused
  • TRACING-3091 - Tempo operator with TLS does not work on OpenShift
  • TRACING-3142 - Fix ServiceMonitor for gateway
  • TRACING-3143 - tempostack_status_condition metric doesn't get updated in some cases
  • TRACING-3147 - Improve tempo version detection
  • TRACING-3173 - jaeger-operator pod restarting with OOMKilled with the default memory value
  • TRACING-3190 - opentelemetry-operator-controller-manager crashlooping after receiving opentelemetry-operator.v0.74.0-5
  • TRACING-3204 - Remove resource limits for Tempo Operator but keep the resource.requests
  • TRACING-3213 - Validation webhooks panics for invalid tenant configuration
  • TRACING-3243 - OpenTelemetry Collector version is not reported properly after a upgrading
  • TRACING-3312 - When deploying Service Mesh on SNO in a disconnected environment , the Jaeger Pod frequently goes into Pending state
  • TRACING-3322 - 16685 is not properly exposed in the Jaeger Operator
  • TRACING-3396 - Operator monitoring only works when operator is installed in openshift-operators-redhat

CVEs

  • CVE-2023-24534
  • CVE-2023-24536
  • CVE-2023-24537
  • CVE-2023-24538

References

  • https://access.redhat.com/security/updates/classification/#moderate

ppc64le

rhosdt/jaeger-agent-rhel8@sha256:245b3a4fcc6ed62f74679e620284095a7faae32b796571dfd55f1a9f2f05d683
rhosdt/jaeger-all-in-one-rhel8@sha256:26e1ee47bd0d2ca13b14dba616d333d3c0164e7758c893bc6813dfc49bb29040
rhosdt/jaeger-collector-rhel8@sha256:3c69ca16cc58b5472a20aa7feb7f290f97b73125b0f9c9982c87ad4486e8414e
rhosdt/jaeger-es-index-cleaner-rhel8@sha256:510f2f64e5e24c527541300ac9349a8e0ebc1a4856fc347aad5f5f5b187d2225
rhosdt/jaeger-es-rollover-rhel8@sha256:f35f3b371550adba3276ec9e969b51d26b67380294f3775031cda4b1572be084
rhosdt/jaeger-ingester-rhel8@sha256:f4fb59d36ac33e3a5c5b5eedcccfbb039f4ca50e61cc7e1bcb68ed89b0903745
rhosdt/jaeger-operator-bundle@sha256:d60fd47d90d3195ade9ff821520337dadf4128061a3cbeea2eb7bc28f4647e0a
rhosdt/jaeger-query-rhel8@sha256:e5d016116f2d35dabf0e445a920966581b15292bdef782d126f5a56c60077055
rhosdt/jaeger-rhel8-operator@sha256:e04ca83905b906b2ac22fab5420629a61f9210a3a4779a60966813aaced99541
rhosdt/opentelemetry-collector-rhel8@sha256:5cdc56e19e233f07820de14aed266ca8d9121fc06bedd6189401d2f420206901
rhosdt/opentelemetry-operator-bundle@sha256:33a56369c46932a40c67b718df7b10d06b7c3b0ff93b09439a6f3c654c798703
rhosdt/opentelemetry-rhel8-operator@sha256:6b849b43190d300cabc0d9113ffad843e49175a80f38ad5636e20357c722aef1
rhosdt/tempo-gateway-opa-rhel8@sha256:74fb8268f08f8e3902ceeba2ee918bbdae3b4f3247d7df3ae09db88b1ff6112c
rhosdt/tempo-gateway-rhel8@sha256:84e5b718f78e99f5ea97bd72a69d56dd01300dc2d2f23b753de986afb62bb3e3
rhosdt/tempo-operator-bundle@sha256:f38b11f21f25f1c241c079dd85a2e854308577df3adb31724b7dcd0783f29ebe
rhosdt/tempo-query-rhel8@sha256:419de0214012fdadc302ff0a90d10db70321639a0bc3ed512e6fe4fc730b8e1f
rhosdt/tempo-rhel8@sha256:512ce6df09d6bd19a147fff161c6abf7f966e1ef408e74c21435ff5adefa5471
rhosdt/tempo-rhel8-operator@sha256:2dd4b14b120824a67fa0bfa5beb9753f215b5337a1aa65c4fb305fa72a70d006

s390x

rhosdt/jaeger-agent-rhel8@sha256:d26cffb00efb86685fef638702f583f7c157f157246c87366a8d1f77b777cf31
rhosdt/jaeger-all-in-one-rhel8@sha256:6fa1ece1d0e77e540fb80648f318810051025646962da4752420edf6da43caa5
rhosdt/jaeger-collector-rhel8@sha256:f48d37bf230ff3b408302004e7e15d6cd0dedab5877d867b3770863a9d38bea6
rhosdt/jaeger-es-index-cleaner-rhel8@sha256:f1753cf36d7a657a4d60107b342781155289119b39976ddc776c8dd976051766
rhosdt/jaeger-es-rollover-rhel8@sha256:05c490e65a007d04d9006e9be375dc3015eec3ca0c538d5ff24a1b5129c23752
rhosdt/jaeger-ingester-rhel8@sha256:0e0439a327c78aab214d0f00484fe4dafb1c214dfa63c9d1d520f0becc05ae4f
rhosdt/jaeger-operator-bundle@sha256:d220c38ea995ebb78d9df0a8a11c56fcfcc5f26cd6e769cf90c6a703914dcc76
rhosdt/jaeger-query-rhel8@sha256:22177a3d088095292aaae48023477e3069f10cf91586f0236e02b481098eff2d
rhosdt/jaeger-rhel8-operator@sha256:e81105452ece3ccd9d1e7cf9f91d2fbbb06f12b4892289ddc94b0e922321589f
rhosdt/opentelemetry-collector-rhel8@sha256:84e253ca4781b8f6845cbcb6d9ef9e68cd152f72f5217d9befa2b8a47ca67516
rhosdt/opentelemetry-operator-bundle@sha256:b0890928d9ebc88f1fa059112859c5b5b4139e2ea3542724f76f8c9f9d6044ca
rhosdt/opentelemetry-rhel8-operator@sha256:3b8e624b4915d7625551b50b36d2b75a6c3be0fbbfb2be01cb63e972999303ca
rhosdt/tempo-gateway-opa-rhel8@sha256:8f06abe7773af8901a8c4beeea8aed9e464852101cced7acda66aa80444cbafe
rhosdt/tempo-gateway-rhel8@sha256:37208be11e9af9009bd8ad16eb591b78d250bb1603f9e67ad9a1aa31a390772d
rhosdt/tempo-operator-bundle@sha256:d93d10ed6c15912c8b2dd259e0b9008f7c37706e9b6388a5f1b89a7175b99c55
rhosdt/tempo-query-rhel8@sha256:4bfd3efce54c8527d26d9c06ab3e42725d6edb1395ba94c3632b216df7b4948c
rhosdt/tempo-rhel8@sha256:08ac8806edeac078a11dcb00bda791ef869c68287faa3ea577c614c228141bcc
rhosdt/tempo-rhel8-operator@sha256:cf9d2e1f3b7b178b846d4a8e45fe1f4e221cabc0d60d0357768a1580c9df7148

x86_64

rhosdt/jaeger-agent-rhel8@sha256:d8bc6495463d50293f954ce8dd7f70e0416e78baed86cbd4355693f701593c17
rhosdt/jaeger-all-in-one-rhel8@sha256:8af8b45b6a81bc08043171c76414d3e07f96ef160e9d46867ecc7d9b904465eb
rhosdt/jaeger-collector-rhel8@sha256:595b6828dd9cd8d1b6643682ada8d1192cbb5c65a1cfb9da452ad184d2523223
rhosdt/jaeger-es-index-cleaner-rhel8@sha256:acb3481b4a9640fdcea057098d8bafdc17c80dfea8beff51aae912d31d03fd0d
rhosdt/jaeger-es-rollover-rhel8@sha256:97b4b06104ef210e6684f00d2b58406975d08342b8ae537dd3b54c87223d5752
rhosdt/jaeger-ingester-rhel8@sha256:476cece9d0a3a846c4dc008e13ebe86cf52fb49b0963224c8d83ffa00f99baa1
rhosdt/jaeger-operator-bundle@sha256:cd4e0e2caa098465cbc2bd770904f471a9a95059145c01bd4c17689c2217bbd7
rhosdt/jaeger-query-rhel8@sha256:1934e02db3e8462475b7ba51860fb7df81da92e5c3cbaabc2eac0a88350d176a
rhosdt/jaeger-rhel8-operator@sha256:da1cc99bce2cca6127a887fc4c2190f97fb7b5ec3be119cc8ff6bfb2cbc4606d
rhosdt/opentelemetry-collector-rhel8@sha256:0604dab5223b184fe502a493e7d2e96082e17ef3cf9864f37d889ac18aa19876
rhosdt/opentelemetry-operator-bundle@sha256:5c174a544295cf8a2f60ff6e518d157b162ab005ba447e9f147276c026362e01
rhosdt/opentelemetry-rhel8-operator@sha256:7d7bec09d4ab03fd266dcb2f4ba40450d055f3be704367a737ff52ae2d7eb5cf
rhosdt/tempo-gateway-opa-rhel8@sha256:6d75b80bb63ee161721ac638a8c557dee1c22c8aa62404fbcaea860f1a411334
rhosdt/tempo-gateway-rhel8@sha256:2ce312488986d2b998c2d1241ba603353aeda667fe2e8e334e2b69b826127180
rhosdt/tempo-operator-bundle@sha256:7b1846b0f0e31aad9d31cb1deb11b8671e0f12ef2d375bf739c52006e3d3280a
rhosdt/tempo-query-rhel8@sha256:3f7d332ed5e713cb683919824d63570e10664d3ca88a1e62c36a8f765a541140
rhosdt/tempo-rhel8@sha256:b6b8624bf309f0dcdb41a0e3d2d5657529a162b245537d7f08178edd3eef74a2
rhosdt/tempo-rhel8-operator@sha256:bcee0df7299e003f07d5491334d7a961d0d338af8c8a9e1bf2ba942258c8ce30

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility