We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole. This can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics.
Reserved 2025-03-27 | Published 2025-04-02 | Updated 2025-05-22 | Assigner redhatExposure of Sensitive Information to an Unauthorized Actor
2025-03-27: | Reported to Red Hat. |
2025-03-27: | Made public. |
access.redhat.com/errata/RHSA-2025:3607 (RHSA-2025:3607)
access.redhat.com/errata/RHSA-2025:3740 (RHSA-2025:3740)
access.redhat.com/security/cve/CVE-2025-2842
bugzilla.redhat.com/show_bug.cgi?id=2355219 (RHBZ#2355219)
Support options