Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Red Hat Security Advisory 2022-6882-01[6]
- Authored by Red Hat[7] | Site access.redhat.com[8]
-
Red Hat Security Advisory 2022-6882-01 - Openshift Logging 5.3.13 security and bug fix release.
- systems | linux[9], redhat[10]
- advisories | CVE-2020-35525[11], CVE-2020-35527[12], CVE-2022-0494[13], CVE-2022-1353[14], CVE-2022-21618[15], CVE-2022-21619[16], CVE-2022-21624[17], CVE-2022-21626[18], CVE-2022-21628[19], CVE-2022-23816[20], CVE-2022-23825[21], CVE-2022-2509[22], CVE-2022-2588[23], CVE-2022-29900[24]
- SHA-256 |
7e65b18002978caefe3c4db2dc816316d156cfdc8df48304228fbb8fa76dbb4f
- Download[25] | Favorite[26] | View[27]
Change Mirror[28] Download[29]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Openshift Logging 5.3.13 security and bug fix release
Advisory ID: RHSA-2022:6882-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2022:6882
Issue date: 2022-11-09
CVE Names: CVE-2020-35525 CVE-2020-35527 CVE-2022-0494
CVE-2022-1353 CVE-2022-2509 CVE-2022-2588
CVE-2022-3515 CVE-2022-21618 CVE-2022-21619
CVE-2022-21624 CVE-2022-21626 CVE-2022-21628
CVE-2022-23816 CVE-2022-23825 CVE-2022-29900
CVE-2022-29901 CVE-2022-32149 CVE-2022-37434
CVE-2022-39399 CVE-2022-40674
====================================================================
1. Summary:
An update is now available for OpenShift Logging 5.3.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Description:
Openshift Logging 5.3.13 security and bug fix release
Security Fix(es):
* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time
to parse complex tags (CVE-2022-32149)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
3. Solution:
For OpenShift Container Platform 4.9 see the following documentation, which
will be updated shortly, for detailed release notes:
https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-release-notes.html
For Red Hat OpenShift Logging 5.3, see the following instructions to apply
this update:
https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html
4. Bugs fixed (https://bugzilla.redhat.com/):
2134010 - CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags
5. References:
https://access.redhat.com/security/cve/CVE-2020-35525
https://access.redhat.com/security/cve/CVE-2020-35527
https://access.redhat.com/security/cve/CVE-2022-0494
https://access.redhat.com/security/cve/CVE-2022-1353
https://access.redhat.com/security/cve/CVE-2022-2509
https://access.redhat.com/security/cve/CVE-2022-2588
https://access.redhat.com/security/cve/CVE-2022-3515
https://access.redhat.com/security/cve/CVE-2022-21618
https://access.redhat.com/security/cve/CVE-2022-21619
https://access.redhat.com/security/cve/CVE-2022-21624
https://access.redhat.com/security/cve/CVE-2022-21626
https://access.redhat.com/security/cve/CVE-2022-21628
https://access.redhat.com/security/cve/CVE-2022-23816
https://access.redhat.com/security/cve/CVE-2022-23825
https://access.redhat.com/security/cve/CVE-2022-29900
https://access.redhat.com/security/cve/CVE-2022-29901
https://access.redhat.com/security/cve/CVE-2022-32149
https://access.redhat.com/security/cve/CVE-2022-37434
https://access.redhat.com/security/cve/CVE-2022-39399
https://access.redhat.com/security/cve/CVE-2022-40674
https://access.redhat.com/security/updates/classification/#moderate
6. Contact:
The Red Hat security contact is <Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser. >. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIVAwUBY2v3pdzjgjWX9erEAQieXA//RS5LPNCMBmQuk2BFdWb8ac7zWMDMh6ia
qMmQdkJurPEKzihaFAHCTv8cAjQhydghH48dATJobRXe545sGP2BpLOUrlQj52/u
tY80fOTre7ocZqtQPznax7CFeigk3f959PjWzjPztSznxblj/2i52DrPFNg9uvj+
5BI/kp+tztKTXLFmjUXC+SilR5Q1KLNsEhscIJ6frqz3wIB4acVj2YMNHbFLC3Zu
aTH64AFFvfac1IhBFtD51KgS+0p6ReAetCt3KssdEFgv+ajLwvnitzfrBOCnp4y7
rvc/AdhKeQDWYvvFPsjYdD8qRHplMMBSDolshDLq4/Qhxwha80wTJ4282NTpZilY
8zdweut+1H+Wg8o6RYKmoWPbuncdhk3JVoqNFmmYsOdFRyH2Dezeqpe1P3eiT4vY
iM8zOfJM8XyCSis3rm1A9hUed2yBl7A1mNMVRke24xmayBfe5cVUHdguKhUQTDyh
4lVvkFY91S6izDLyiVTU5QoPmMHSef6w+uRkumOHDuGCxFctlmBMFHzBiUTYdkmk
moPMpZWf4YKzFSMLZuC562uQ2Y7lP/GBkPuVxa0aa04PMXdMb0fLuYyaUzsks8kW
r37lN9gtMLVrLaX5tTa4UyHjWy2P2kkH+8ZeHs7RqrDHawISEGoo0NsD8D4LG7FC
2eYvDFN/BO4=lzPS
-----END PGP SIGNATURE-----
--
RHSA-announce mailing listCette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
https://listman.redhat.com/mailman/listinfo/rhsa-announce
File Tags
- ActiveX[34] (932)
- Advisory[35] (79,400)
- Arbitrary[36] (15,609)
- BBS[37] (2,859)
- Bypass[38] (1,610)
- CGI[39] (1,015)
- Code Execution[40] (6,880)
- Conference[41] (672)
- Cracker[42] (840)
- CSRF[43] (3,283)
- DoS[44] (22,481)
- Encryption[45] (2,348)
- Exploit[46] (50,242)
- File Inclusion[47] (4,161)
- File Upload[48] (945)
- Firewall[49] (821)
- Info Disclosure[50] (2,650)
- Intrusion Detection[51] (864)
- Java[52] (2,884)
- JavaScript[53] (816)
- Kernel[54] (6,238)
- Local[55] (14,158)
- Magazine[56] (586)
- Overflow[57] (12,363)
- Perl[58] (1,417)
- PHP[59] (5,081)
- Proof of Concept[60] (2,287)
- Protocol[61] (3,418)
- Python[62] (1,444)
- Remote[63] (29,978)
- Root[64] (3,493)
- Ruby[65] (594)
- Scanner[66] (1,631)
- Security Tool[67] (7,762)
- Shell[68] (3,097)
- Shellcode[69] (1,204)
- Sniffer[70] (885)
- Spoof[71] (2,163)
- SQL Injection[72] (16,082)
- TCP[73] (2,376)
- Trojan[74] (682)
- UDP[75] (875)
- Virus[76] (660)
- Vulnerability[77] (31,047)
- Web[78] (9,307)
- Whitepaper[79] (3,724)
- x86[80] (944)
- XSS[81] (17,468)
- Other[82]
File Archives
- November 2022[83]
- October 2022[84]
- September 2022[85]
- August 2022[86]
- July 2022[87]
- June 2022[88]
- May 2022[89]
- April 2022[90]
- March 2022[91]
- February 2022[92]
- January 2022[93]
- December 2021[94]
- Older[95]
Systems
- AIX[96] (426)
- Apple[97] (1,924)
- BSD[98] (370)
- CentOS[99] (55)
- Cisco[100] (1,916)
- Debian[101] (6,606)
- Fedora[102] (1,690)
- FreeBSD[103] (1,242)
- Gentoo[104] (4,262)
- HPUX[105] (878)
- iOS[106] (329)
- iPhone[107] (108)
- IRIX[108] (220)
- Juniper[109] (67)
- Linux[110] (43,964)
- Mac OS X[111] (684)
- Mandriva[112] (3,105)
- NetBSD[113] (255)
- OpenBSD[114] (479)
- RedHat[115] (12,243)
- Slackware[116] (941)
- Solaris[117] (1,607)
- SUSE[118] (1,444)
- Ubuntu[119] (8,114)
- UNIX[120] (9,143)
- UnixWare[121] (185)
- Windows[122] (6,493)
- Other[123]
Read more https://packetstormsecurity.com/files/169804/RHSA-2022-6882-01.txt