First published: Thu Dec 16 2021(Updated: )
Red Hat OpenShift Container Platform is Red Hat's cloud computing<br>Kubernetes application platform solution designed for on-premise or private<br>cloud deployments.<br>Security Fix(es):<br><li> kube-reporting/hive: Incomplete fix for log4j CVE-2021-44228 and CVE-2021-45046 (CVE-2021-4125)</li> <li> log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Container Platform for IBM LinuxONE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:5183 is classified as critical due to its relation to vulnerabilities in log4j.
To fix RHSA-2021:5183, upgrade to a version of Red Hat OpenShift Container Platform that includes the security patches for CVE-2021-44228 and CVE-2021-45046.
RHSA-2021:5183 addresses vulnerabilities CVE-2021-44228 and CVE-2021-45046 in the log4j library.
RHSA-2021:5183 is applicable only to specific affected versions of Red Hat OpenShift Container Platform.
Failing to address RHSA-2021:5183 exposes your system to potential remote code execution attacks and exploitation through the affected log4j vulnerabilities.