- Issued:
- 2023-02-09
- Updated:
- 2023-02-09
RHSA-2023:0634 - Security Advisory
Synopsis
Moderate: Red Hat OpenShift (Logging Subsystem) security update
Type/Severity
Security Advisory: Moderate
Topic
Logging Subsystem 5.6.1 - Red Hat OpenShift
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Logging Subsystem 5.6.1 - Red Hat OpenShift
Security Fix(es):
- glob-parent: Regular Expression Denial of Service (CVE-2021-35065)
- json5: Prototype Pollution in JSON5 via Parse Method (CVE-2022-46175)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Logging Subsystem for Red Hat OpenShift for ARM 64 5 for RHEL 8 aarch64
- Logging Subsystem for Red Hat OpenShift 5 for RHEL 8 x86_64
- Logging Subsystem for Red Hat OpenShift for IBM Power, little endian 5 for RHEL 8 ppc64le
- Logging Subsystem for Red Hat OpenShift for IBM Z and LinuxONE 5 for RHEL 8 s390x
Fixes
- BZ - 2156263 - CVE-2022-46175 json5: Prototype Pollution in JSON5 via Parse Method
- BZ - 2156324 - CVE-2021-35065 glob-parent: Regular Expression Denial of Service
- LOG-3397 - [Developer Console] "parse error" when testing with normal user
- LOG-3441 - [Administrator Console] Seeing "parse error" while using Severity filter for cluster view user
- LOG-3463 - [release-5.6] ElasticsearchError error="400 - Rejected by Elasticsearch" when adding some labels in application namespaces
- LOG-3477 - [Logging 5.6.0]CLF raises 'invalid: unrecognized outputs: [default]' after adding `default` to outputRefs.
- LOG-3494 - [release-5.6] After querying logs in loki, compactor pod raises many TLS handshake error if retention policy is enabled.
- LOG-3496 - [release-5.6] LokiStack status is still 'Pending' when all loki components are running
- LOG-3510 - [release-5.6] TLS errors on Loki controller pod due to bad certificate
CVEs
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.