Issued:
2024-03-27
Updated:
2024-03-27

RHSA-2024:1507 - Moderate: logging for Red Hat OpenShift security update


Synopsis

Moderate: logging for Red Hat OpenShift security update

Type/Severity

Security Advisory Moderate

Topic

An update is now available for RHOL-5.6-RHEL-8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Logging for Red Hat OpenShift is an opinionated collector and normalizer of application, infrastructure, and audit logs. It is intended to be used for forwarding logs to various supported systems.

Security Fix(es):

  • golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:

https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

For Red Hat OpenShift Logging 5.6, see the following instructions to apply this update:

https://docs.openshift.com/container-platform/4.11/logging/cluster-logging-upgrading.html

Affected Products

ProductVersionArch
Logging Subsystem for Red Hat OpenShift5x86_64
Logging Subsystem for Red Hat OpenShift for IBM Z and LinuxONE5s390x
Logging Subsystem for Red Hat OpenShift for IBM Power, little endian5ppc64le
Logging Subsystem for Red Hat OpenShift for ARM 645aarch64

Fixes

CVEs

References


Additional information