First published: Wed May 11 2022(Updated: )
Openshift Logging Bug Fix Release (5.3.7)<br>Security Fix(es):<br><li> kubeclient: kubeconfig parsing error can lead to MITM attacks (CVE-2022-0759)</li> <li> netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data (CVE-2021-37136)</li> <li> netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137)</li> <li> netty: control chars in header names may lead to HTTP request smuggling (CVE-2021-43797)</li> <li> prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:2217 is classified as critical due to the potential for MITM attacks and other vulnerabilities.
To fix RHSA-2022:2217, apply the updates provided in the advisory for OpenShift Logging version 5.3.7.
RHSA-2022:2217 addresses vulnerabilities including a kubeconfig parsing error leading to MITM attacks and limitations in decompressed data size restrictions.
RHSA-2022:2217 impacts components such as kubeclient and netty-codec within the OpenShift Logging framework.
Yes, there is a risk of data exposure due to the identified vulnerabilities that could be exploited by attackers.