First published: Thu Dec 16 2021(Updated: )
Red Hat OpenShift Container Platform is Red Hat's cloud computing<br>Kubernetes application platform solution designed for on-premise or private<br>cloud deployments.<br>Security Fix(es):<br><li> log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value (CVE-2021-44228)</li> <li> log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104)</li> <li> log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) (CVE-2021-45046)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Container Platform for IBM LinuxONE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:5141 is classified as critical due to the potential for remote code execution.
To fix RHSA-2021:5141, update the log4j-core package to the latest version provided in the advisory.
RHSA-2021:5141 affects multiple versions of the log4j-core package in Red Hat OpenShift Container Platform.
Yes, RHSA-2021:5141 has been widely exploited in the wild, making it crucial to address swiftly.
Yes, due to its critical severity and potential exploitation, immediate action is recommended for RHSA-2021:5141.