Issued:
2023-01-19
Updated:
2023-01-19

RHSA-2023:0264 - Moderate: Red Hat OpenShift Logging Subsystem - security update


Synopsis

Moderate: Red Hat OpenShift (Logging Subsystem) security update

Type/Severity

Security Advisory Moderate

Topic

An update for Logging Subsystem (5.6.0) is now available for Red Hat OpenShift Container Platform.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Logging Subsystem 5.6.0 - Red Hat OpenShift

  • logging-view-plugin-container: loader-utils: prototype pollution in function parseQuery in parseQuery.js (CVE-2022-37601)
  • logging-elasticsearch6-container: jackson-databind: denial of service via a large depth of nested objects (CVE-2020-36518)
  • logging-loki-container: various flaws (CVE-2022-2879 CVE-2022-2880 CVE-2022-41715)
  • logging-loki-container: golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
  • golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)
  • org.elasticsearch-elasticsearch: jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)
  • org.elasticsearch-elasticsearch: jackson-databind: use of deeply nested arrays (CVE-2022-42004)

Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

ProductVersionArch
Logging Subsystem for Red Hat OpenShift5x86_64
Logging Subsystem for Red Hat OpenShift for IBM Z and LinuxONE5s390x
Logging Subsystem for Red Hat OpenShift for IBM Power, little endian5ppc64le
Logging Subsystem for Red Hat OpenShift for ARM 645aarch64

Fixes

CVEs

References


Additional information