First published: Mon Jan 10 2022(Updated: )
Openshift Logging Bug Fix Release (5.0.11)<br>Security Fix(es):<br><li> log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern (CVE-2021-45105)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:0047 is classified as low due to the potential for denial of service.
To fix RHSA-2022:0047, you should update to the latest version of OpenShift Logging that addresses the CVE-2021-45105 vulnerability.
RHSA-2022:0047 addresses the CVE-2021-45105 vulnerability in log4j-core, which can lead to denial of service.
RHSA-2022:0047 affects OpenShift Logging deployments using vulnerable versions of log4j-core.
If updating is not possible, a temporary workaround may involve adjusting MDC input data handling to avoid the recursive lookup.