First published: Wed Jun 05 2024(Updated: )
Important: Red Hat OpenShift distributed tracing 3.2.0 operator/operand containers update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat OpenShift distributed tracing for ARM | ||
Red Hat Red Hat OpenShift distributed tracing for Power, little endian | ||
Red Hat Red Hat OpenShift distributed tracing for IBM Z and LinuxONE | ||
Red Hat Red Hat OpenShift distributed tracing |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:3621 is classified as Important.
To fix RHSA-2024:3621, update your Red Hat OpenShift distributed tracing to the latest version that addresses the vulnerabilities.
RHSA-2024:3621 addresses the HTTP request body disclosure issue in go-resty, identified as CVE-2023-45286.
Affected products include Red Hat OpenShift distributed tracing for ARM, Power, IBM Z, and the standard Red Hat OpenShift distributed tracing.
Not addressing RHSA-2024:3621 may lead to potential exposure of sensitive HTTP request body data.