First published: Thu Aug 18 2022(Updated: )
Logging Subsystem 5.5.0 - Red Hat OpenShift<br>Security Fix(es):<br><li> kubeclient: kubeconfig parsing error can lead to MITM attacks (CVE-2022-0759)</li> <li> golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)</li> <li> golang: out-of-bounds read in golang.org/x/text/language leads to DoS (CVE-2021-38561)</li> <li> prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:6051 varies based on the specific vulnerabilities it addresses, including potential issues like MITM attacks.
To fix RHSA-2022:6051, ensure you apply the recommended security updates provided by Red Hat OpenShift.
RHSA-2022:6051 addresses vulnerabilities including a kubeconfig parsing error that can lead to MITM attacks and a potential stack exhaustion issue.
Not addressing RHSA-2022:6051 could expose systems to MITM attacks and other exploits due to unpatched vulnerabilities.
Users of Red Hat OpenShift that utilize the affected versions of the logging subsystem are impacted by RHSA-2022:6051.