Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Red Hat OpenShift distributed tracing platform
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Red Hat OpenShift distributed tracing platform
ID: RHSA-2025:3607
Distribution: Red Hat
Plattformen: Red Hat OpenShift distributed tracing 3.5.1
Datum: Fr, 4. April 2025, 23:40
Referenzen: https://access.redhat.com/security/cve/CVE-2025-2786
https://access.redhat.com/security/cve/CVE-2025-2842
https://access.redhat.com/errata/RHSA-2025:3607
https://access.redhat.com/security/cve/CVE-2025-30204
https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo
Applikationen: Red Hat OpenShift distributed tracing platform

Originalnachricht

Red Hat OpenShift distributed tracing platform (Tempo) 3.5.1 has been released

Release of Red Hat OpenShift distributed tracing provides following security
improvements, bug fixes, and new features.
The Red Hat OpenShift distributed tracing (Tempo) 3.5.1 is based on the open source link:https://grafana.com/oss/tempo/[Grafana Tempo] release 2.7.1.

Breaking changes:
* With this update, for a user to create or modify a TempoStack or
TempoMonolithic CR with enabled multi-tenancy, the user must have permissions to create a TokenReview and SubjectAccessReview.

Deprecations:
* Nothing

Technology Preview features:
* Nothing

Enhancements:
* Nothing

Bug fixes:
* https://access.redhat.com/security/cve/CVE-2025-2786
* https://access.redhat.com/security/cve/CVE-2025-2842

Known issues:
* Currently, when the OpenShift tenancy mode is enabled, the ServiceAccount of
the gateway component of a TempoStack or TempoMonolithic instance requires the TokenReview and SubjectAccessReview permissions for authorization. Workaround: deploy the instance in a dedicated namespace, and carefully audit which users have permission to read the Secrets in this namespace.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2025-2786: Exposure of Sensitive Information to an Unauthorized Actor
(CWE-200)
CVE-2025-2842: Exposure of Sensitive Information to an Unauthorized Actor
(CWE-200)
CVE-2025-30204: Asymmetric Resource Consumption (Amplification) (CWE-405)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung