First published: Wed Nov 16 2022(Updated: )
Logging Subsystem 5.4.8 - Red Hat OpenShift<br>Security Fix(es):<br><li> jackson-databind: denial of service via a large depth of nested objects (CVE-2020-36518)</li> <li> golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)</li> <li> jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)</li> <li> jackson-databind: use of deeply nested arrays (CVE-2022-42004)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Origin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:7435 includes vulnerabilities that could lead to denial of service.
To fix RHSA-2022:7435, update the affected Software packages to their latest secure versions as recommended by Red Hat.
RHSA-2022:7435 addresses vulnerabilities related to jackson-databind and golang.org/x/text/language resulting in denial of service.
If you are running vulnerable software associated with RHSA-2022:7435, it is crucial to apply the updates provided by Red Hat immediately.
Yes, failing to address RHSA-2022:7435 could expose systems to denial of service attacks, negatively impacting accessibility.