First published: Wed Apr 20 2022(Updated: )
Logging Subsystem 5.4 - Red Hat OpenShift<br>Security Fix(es):<br><li> kubeclient: kubeconfig parsing error can lead to MITM attacks (CVE-2022-0759)</li> <li> prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:1461 is considered to be critical due to the potential for MITM attacks and Denial of Service vulnerabilities.
To fix RHSA-2022:1461, you should update your Red Hat OpenShift Logging Subsystem to the patched version provided in the advisory.
RHSA-2022:1461 addresses a kubeconfig parsing error that can lead to MITM attacks and a Denial of Service vulnerability in the prometheus/client_golang library.
RHSA-2022:1461 affects the Logging Subsystem 5.4 of Red Hat OpenShift.
If RHSA-2022:1461 is not remediated, it could leave your system vulnerable to MITM attacks and Denial of Service, potentially impacting availability and data security.