First published: Mon Jan 10 2022(Updated: )
OpenShift Logging Bug Fix Release (5.3.2)<br>Security Fix(es):<br><li> rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)</li> <li> log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern (CVE-2021-45105)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Container Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2022:0044 addresses critical vulnerabilities including a denial of service in log4j.
To fix RHSA-2022:0044, upgrade to the patched version of OpenShift Logging as recommended.
RHSA-2022:0044 addresses vulnerabilities related to rubygem-bundler and log4j-core.
RHSA-2022:0044 is specifically intended for OpenShift version 5.3.2 and may not apply to earlier versions.
Ignoring RHSA-2022:0044 could lead to exposure to denial of service attacks and potential exploitation of vulnerabilities in your logging system.