First published: Wed Dec 15 2021(Updated: )
Red Hat OpenShift Container Platform is Red Hat's cloud computing<br>Kubernetes application platform solution designed for on-premise or private<br>cloud deployments.<br>Security Fix(es):<br><li> log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value (CVE-2021-44228)</li> <li> log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104)</li> <li> log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) (CVE-2021-45046)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Container Platform for IBM LinuxONE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:5148 is critical due to remote code execution vulnerabilities in Log4j 2.x.
To fix RHSA-2021:5148, update to the latest version of log4j-core as specified in the security advisory.
RHSA-2021:5148 affects versions of Red Hat OpenShift Container Platform utilizing vulnerable log4j-core versions.
Yes, a reboot may be required after applying the fix for RHSA-2021:5148 to ensure that all components are using the updated libraries.
RHSA-2021:5148 addresses vulnerabilities related to remote code execution stemming from attacker-controlled log data in Log4j 2.x.