First published: Thu Dec 16 2021(Updated: )
It was found that the original fix for log4j <a href="https://access.redhat.com/security/cve/CVE-2021-44228">CVE-2021-44228</a> and <a href="https://access.redhat.com/security/cve/CVE-2021-45046">CVE-2021-45046</a> in the OpenShift metering hive containers was incomplete, as not all JndiLookup.class files were removed.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Openshift | >=4.6.0<4.6.52 | |
Redhat Openshift | >=4.7.0<4.7.40 | |
Redhat Openshift | >=4.8.0<4.8.24 |
Please follow the Mitigation advice for the original CVEs.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-4125 is a vulnerability that was found in the OpenShift metering hive containers, where the original fix for log4j CVE-2021-44228 and CVE-2021-45046 was incomplete.
CVE-2021-4125 has a severity rating of 8.1 (critical).
The OpenShift metering hive container images in OpenShift versions 4.8, 4.7, and 4.6 are affected by CVE-2021-4125.
To fix the CVE-2021-4125 vulnerability, you should update your OpenShift Metering hive container images to include the complete fix for log4j CVE-2021-44228 and CVE-2021-45046.
You can find more information about CVE-2021-4125 on the Red Hat Security Advisory page: [link](https://access.redhat.com/security/cve/CVE-2021-4125).