First published: Tue Dec 14 2021(Updated: )
Openshift Logging Bug Fix Release (5.0.10)<br>Security Fix(es):<br><li> log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value (CVE-2021-44228)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Logging |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:5137 is classified as moderate.
To fix RHSA-2021:5137, update your OpenShift Logging to the version that addresses the log4j vulnerability.
CVE-2021-44228 is a vulnerability that allows remote code execution through maliciously crafted log strings in Log4j 2.x.
RHSA-2021:5137 affects OpenShift Logging components using log4j-core.
The log4j vulnerability in RHSA-2021:5137 is considered serious but is classified as moderate in this specific release.