First published: Mon Jan 10 2022(Updated: )
Openshift Logging Bug Fix Release (5.2.5)<br>Security Fix(es):<br><li> log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern (CVE-2021-45105)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:0043 is categorized as critical due to the potential denial of service vulnerability in log4j-core.
You can fix RHSA-2022:0043 by updating log4j-core to the latest patched version provided in the advisory.
RHSA-2022:0043 addresses the denial of service vulnerability CVE-2021-45105 in log4j-core.
RHSA-2022:0043 affects Red Hat OpenShift Logging versions that utilize log4j-core.
There are no specific workarounds provided for RHSA-2022:0043, so applying the update is recommended.