First published: Thu Feb 09 2023(Updated: )
Logging Subsystem 5.6.1 - Red Hat OpenShift<br>Security Fix(es):<br><li> glob-parent: Regular Expression Denial of Service (CVE-2021-35065)</li> <li> json5: Prototype Pollution in JSON5 via Parse Method (CVE-2022-46175)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Origin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:0634 includes a Regular Expression Denial of Service and Prototype Pollution vulnerabilities.
To fix RHSA-2023:0634, you should apply the security updates provided by Red Hat for the affected components.
RHSA-2023:0634 addresses CVE-2021-35065 (Regular Expression Denial of Service) and CVE-2022-46175 (Prototype Pollution in JSON5).
You should check if your version of Red Hat OpenShift includes the affected logging subsystem versions to determine if your system is affected.
Not addressing RHSA-2023:0634 may expose your system to denial of service attacks and exploitation of prototype pollution in JSON handling.