- Issued:
- 2024-07-24
- Updated:
- 2024-07-25
RHSA-2024:4336 - Moderate: security update Logging for Red Hat OpenShift - 5.6.21
Synopsis
Moderate: security update Logging for Red Hat OpenShift - 5.6.21
Type/Severity
Security Advisory Moderate
Topic
Moderate -- Logging for Red Hat OpenShift - 5.6.21
Description
Logging for Red Hat OpenShift - 5.6.21 golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (CVE-2024-24790)
Solution
For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:
https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html
For Red Hat OpenShift Logging 5.6, see the following instructions to apply this update:
https://docs.openshift.com/container-platform/4.11/logging/cluster-logging-upgrading.html
Affected Products
| Product | Version | Arch |
|---|---|---|
| Logging Subsystem for Red Hat OpenShift | 5 | x86_64 |
| Logging Subsystem for Red Hat OpenShift for IBM Z and LinuxONE | 5 | s390x |
| Logging Subsystem for Red Hat OpenShift for IBM Power, little endian | 5 | ppc64le |
| Logging Subsystem for Red Hat OpenShift for ARM 64 | 5 | aarch64 |
Fixes
CVEs
- CVE-2020-26555
- CVE-2021-46909
- CVE-2021-46972
- CVE-2021-47069
- CVE-2021-47073
- CVE-2021-47236
- CVE-2021-47310
- CVE-2021-47311
- CVE-2021-47353
- CVE-2021-47356
- CVE-2021-47456
- CVE-2021-47495
- CVE-2022-48624
- CVE-2023-2953
- CVE-2023-5090
- CVE-2023-52464
- CVE-2023-52560
- CVE-2023-52615
- CVE-2023-52626
- CVE-2023-52667
- CVE-2023-52669
- CVE-2023-52675
- CVE-2023-52686
- CVE-2023-52700
- CVE-2023-52703
- CVE-2023-52781
- CVE-2023-52813
- CVE-2023-52835
- CVE-2023-52877
- CVE-2023-52878
- CVE-2023-52881
- CVE-2024-3651
- CVE-2024-24790
- CVE-2024-24806
- CVE-2024-26583
- CVE-2024-26584
- CVE-2024-26585
- CVE-2024-26656
- CVE-2024-26675
- CVE-2024-26735
- CVE-2024-26759
- CVE-2024-26801
- CVE-2024-26804
- CVE-2024-26826
- CVE-2024-26859
- CVE-2024-26906
- CVE-2024-26907
- CVE-2024-26974
- CVE-2024-26982
- CVE-2024-27397
- CVE-2024-27410
- CVE-2024-28182
- CVE-2024-32002
- CVE-2024-32004
- CVE-2024-32020
- CVE-2024-32021
- CVE-2024-32465
- CVE-2024-32487
- CVE-2024-35235
- CVE-2024-35789
- CVE-2024-35835
- CVE-2024-35838
- CVE-2024-35845
- CVE-2024-35852
- CVE-2024-35853
- CVE-2024-35854
- CVE-2024-35855
- CVE-2024-35888
- CVE-2024-35890
- CVE-2024-35958
- CVE-2024-35959
- CVE-2024-35960
- CVE-2024-36004
- CVE-2024-36007
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.