rhsa-2022_0026
Vulnerability from csaf_redhat
Published
2022-01-12 09:50
Modified
2024-11-25 10:48
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.6.53 security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.6.53 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.6.
Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.53. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2022:0025
Security Fix(es):
* log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data
contains a recursive lookup and context lookup pattern (CVE-2021-45105)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s)
listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.6.53 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.53. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2022:0025\n\nSecurity Fix(es):\n\n* log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data\ncontains a recursive lookup and context lookup pattern (CVE-2021-45105)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s)\nlisted in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0026", "url": "https://access.redhat.com/errata/RHSA-2022:0026" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "2034067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034067" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0026.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.53 security update", "tracking": { "current_release_date": "2024-11-25T10:48:55+00:00", "generator": { "date": "2024-11-25T10:48:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:0026", "initial_release_date": "2022-01-12T09:50:38+00:00", "revision_history": [ { "date": "2022-01-12T09:50:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-12T09:50:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T10:48:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-logging-operator@sha256:36fb516f19ab985c16b353898a7f50b898adeb1c78a7c2743a0658cb19a05484_s390x", "product": { "name": "openshift4/ose-cluster-logging-operator@sha256:36fb516f19ab985c16b353898a7f50b898adeb1c78a7c2743a0658cb19a05484_s390x", "product_id": "openshift4/ose-cluster-logging-operator@sha256:36fb516f19ab985c16b353898a7f50b898adeb1c78a7c2743a0658cb19a05484_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-logging-operator@sha256:36fb516f19ab985c16b353898a7f50b898adeb1c78a7c2743a0658cb19a05484?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-logging-operator\u0026tag=v4.6.0-202201061151.p0.g7f7eccc.assembly.4.6.53" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator@sha256:eba0695fa94be0d083f86bc962352699a44357ef02f22e0ef80caedf31150bbe_s390x", "product": { "name": "openshift4/ose-elasticsearch-operator@sha256:eba0695fa94be0d083f86bc962352699a44357ef02f22e0ef80caedf31150bbe_s390x", "product_id": "openshift4/ose-elasticsearch-operator@sha256:eba0695fa94be0d083f86bc962352699a44357ef02f22e0ef80caedf31150bbe_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-operator@sha256:eba0695fa94be0d083f86bc962352699a44357ef02f22e0ef80caedf31150bbe?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-operator\u0026tag=v4.6.0-202112201736.p0.gd421c69.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-logging-curator5@sha256:d696874a0eeac134653d68d38bc36a57517b93c4be2e16eb9f3f6ad3d2a6bd16_s390x", "product": { "name": "openshift4/ose-logging-curator5@sha256:d696874a0eeac134653d68d38bc36a57517b93c4be2e16eb9f3f6ad3d2a6bd16_s390x", "product_id": "openshift4/ose-logging-curator5@sha256:d696874a0eeac134653d68d38bc36a57517b93c4be2e16eb9f3f6ad3d2a6bd16_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-logging-curator5@sha256:d696874a0eeac134653d68d38bc36a57517b93c4be2e16eb9f3f6ad3d2a6bd16?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-logging-curator5\u0026tag=v4.6.0-202201061151.p0.gce7f68c.assembly.4.6.53" } } }, { "category": "product_version", "name": "openshift4/ose-logging-elasticsearch6@sha256:29643626fe608c5ff0ea815a0afaed3fe7112f6c50963991014542cdb7ece835_s390x", "product": { "name": "openshift4/ose-logging-elasticsearch6@sha256:29643626fe608c5ff0ea815a0afaed3fe7112f6c50963991014542cdb7ece835_s390x", "product_id": "openshift4/ose-logging-elasticsearch6@sha256:29643626fe608c5ff0ea815a0afaed3fe7112f6c50963991014542cdb7ece835_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-logging-elasticsearch6@sha256:29643626fe608c5ff0ea815a0afaed3fe7112f6c50963991014542cdb7ece835?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-logging-elasticsearch6\u0026tag=v4.6.0-202112201736.p0.gce7f68c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-logging-fluentd@sha256:81e179ed88533175874d7f5d34d32a568c6e6b1bd362727305b61f2451dbb060_s390x", "product": { "name": "openshift4/ose-logging-fluentd@sha256:81e179ed88533175874d7f5d34d32a568c6e6b1bd362727305b61f2451dbb060_s390x", "product_id": "openshift4/ose-logging-fluentd@sha256:81e179ed88533175874d7f5d34d32a568c6e6b1bd362727305b61f2451dbb060_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-logging-fluentd@sha256:81e179ed88533175874d7f5d34d32a568c6e6b1bd362727305b61f2451dbb060?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-logging-fluentd\u0026tag=v4.6.0-202112201736.p0.gce7f68c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-logging-kibana6@sha256:39b545a87dedd058beab6206b1cac9ed947dbe30a50f26a35aab25e5e59a6e53_s390x", "product": { "name": "openshift4/ose-logging-kibana6@sha256:39b545a87dedd058beab6206b1cac9ed947dbe30a50f26a35aab25e5e59a6e53_s390x", "product_id": "openshift4/ose-logging-kibana6@sha256:39b545a87dedd058beab6206b1cac9ed947dbe30a50f26a35aab25e5e59a6e53_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-logging-kibana6@sha256:39b545a87dedd058beab6206b1cac9ed947dbe30a50f26a35aab25e5e59a6e53?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-logging-kibana6\u0026tag=v4.6.0-202112201736.p0.gce7f68c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:8349a4a59394b19bf6a745289c327174523fde41e16f0760fc6ede3ff4782bc7_s390x", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:8349a4a59394b19bf6a745289c327174523fde41e16f0760fc6ede3ff4782bc7_s390x", "product_id": "openshift4/ose-egress-dns-proxy@sha256:8349a4a59394b19bf6a745289c327174523fde41e16f0760fc6ede3ff4782bc7_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:8349a4a59394b19bf6a745289c327174523fde41e16f0760fc6ede3ff4782bc7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.6.0-202112141645.p0.g618b71d.assembly.stream" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-logging-operator@sha256:42f65580290ce0f8c840dc3473e11eaa868e1b53b6793e34681b8e5fff5926eb_ppc64le", "product": { "name": "openshift4/ose-cluster-logging-operator@sha256:42f65580290ce0f8c840dc3473e11eaa868e1b53b6793e34681b8e5fff5926eb_ppc64le", "product_id": "openshift4/ose-cluster-logging-operator@sha256:42f65580290ce0f8c840dc3473e11eaa868e1b53b6793e34681b8e5fff5926eb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-logging-operator@sha256:42f65580290ce0f8c840dc3473e11eaa868e1b53b6793e34681b8e5fff5926eb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-logging-operator\u0026tag=v4.6.0-202201061151.p0.g7f7eccc.assembly.4.6.53" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator@sha256:b1320c22359023ced54a7df87ae1cc7e81f6dd0879ca9b57db7cfb1492cb109b_ppc64le", "product": { "name": "openshift4/ose-elasticsearch-operator@sha256:b1320c22359023ced54a7df87ae1cc7e81f6dd0879ca9b57db7cfb1492cb109b_ppc64le", "product_id": "openshift4/ose-elasticsearch-operator@sha256:b1320c22359023ced54a7df87ae1cc7e81f6dd0879ca9b57db7cfb1492cb109b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-operator@sha256:b1320c22359023ced54a7df87ae1cc7e81f6dd0879ca9b57db7cfb1492cb109b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-operator\u0026tag=v4.6.0-202112201736.p0.gd421c69.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-logging-curator5@sha256:2e5d5ad2823b8a40bc7fee550f3078e2794b86daf90a73dc2ec2ea06e5488a26_ppc64le", "product": { "name": "openshift4/ose-logging-curator5@sha256:2e5d5ad2823b8a40bc7fee550f3078e2794b86daf90a73dc2ec2ea06e5488a26_ppc64le", "product_id": "openshift4/ose-logging-curator5@sha256:2e5d5ad2823b8a40bc7fee550f3078e2794b86daf90a73dc2ec2ea06e5488a26_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-logging-curator5@sha256:2e5d5ad2823b8a40bc7fee550f3078e2794b86daf90a73dc2ec2ea06e5488a26?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-logging-curator5\u0026tag=v4.6.0-202201061151.p0.gce7f68c.assembly.4.6.53" } } }, { "category": "product_version", "name": "openshift4/ose-logging-elasticsearch6@sha256:169e6882974d9cd36d72e1db75b57071aca7b8cf5aa2c13c8f7e3157505b80c3_ppc64le", "product": { "name": "openshift4/ose-logging-elasticsearch6@sha256:169e6882974d9cd36d72e1db75b57071aca7b8cf5aa2c13c8f7e3157505b80c3_ppc64le", "product_id": "openshift4/ose-logging-elasticsearch6@sha256:169e6882974d9cd36d72e1db75b57071aca7b8cf5aa2c13c8f7e3157505b80c3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-logging-elasticsearch6@sha256:169e6882974d9cd36d72e1db75b57071aca7b8cf5aa2c13c8f7e3157505b80c3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-logging-elasticsearch6\u0026tag=v4.6.0-202112201736.p0.gce7f68c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-logging-fluentd@sha256:71abdeda606871f7b84a09debbddf204ee99f42e806b10f0cd17e5d74632757c_ppc64le", "product": { "name": "openshift4/ose-logging-fluentd@sha256:71abdeda606871f7b84a09debbddf204ee99f42e806b10f0cd17e5d74632757c_ppc64le", "product_id": "openshift4/ose-logging-fluentd@sha256:71abdeda606871f7b84a09debbddf204ee99f42e806b10f0cd17e5d74632757c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-logging-fluentd@sha256:71abdeda606871f7b84a09debbddf204ee99f42e806b10f0cd17e5d74632757c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-logging-fluentd\u0026tag=v4.6.0-202112201736.p0.gce7f68c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-logging-kibana6@sha256:79aa1de7f02407c2560597368614340d06cf2bd57f500860f75344d70e3b3a5d_ppc64le", "product": { "name": "openshift4/ose-logging-kibana6@sha256:79aa1de7f02407c2560597368614340d06cf2bd57f500860f75344d70e3b3a5d_ppc64le", "product_id": "openshift4/ose-logging-kibana6@sha256:79aa1de7f02407c2560597368614340d06cf2bd57f500860f75344d70e3b3a5d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-logging-kibana6@sha256:79aa1de7f02407c2560597368614340d06cf2bd57f500860f75344d70e3b3a5d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-logging-kibana6\u0026tag=v4.6.0-202112201736.p0.gce7f68c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:d5810afd8c7d36f44c5130bd4bdcf2215dcc99582d020b1db4a8866606707121_ppc64le", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:d5810afd8c7d36f44c5130bd4bdcf2215dcc99582d020b1db4a8866606707121_ppc64le", "product_id": "openshift4/ose-egress-dns-proxy@sha256:d5810afd8c7d36f44c5130bd4bdcf2215dcc99582d020b1db4a8866606707121_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:d5810afd8c7d36f44c5130bd4bdcf2215dcc99582d020b1db4a8866606707121?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.6.0-202112141645.p0.g618b71d.assembly.stream" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-logging-operator@sha256:d101b67692e9d5cca517be23106835124a27e67dc1372f10aebf768210c77441_amd64", "product": { "name": "openshift4/ose-cluster-logging-operator@sha256:d101b67692e9d5cca517be23106835124a27e67dc1372f10aebf768210c77441_amd64", "product_id": "openshift4/ose-cluster-logging-operator@sha256:d101b67692e9d5cca517be23106835124a27e67dc1372f10aebf768210c77441_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-logging-operator@sha256:d101b67692e9d5cca517be23106835124a27e67dc1372f10aebf768210c77441?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-logging-operator\u0026tag=v4.6.0-202201061151.p0.g7f7eccc.assembly.4.6.53" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator@sha256:bbb81923102a18e5123d3273684feb69dce22715eeda2330ed47569cc4b60a7d_amd64", "product": { "name": "openshift4/ose-elasticsearch-operator@sha256:bbb81923102a18e5123d3273684feb69dce22715eeda2330ed47569cc4b60a7d_amd64", "product_id": "openshift4/ose-elasticsearch-operator@sha256:bbb81923102a18e5123d3273684feb69dce22715eeda2330ed47569cc4b60a7d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-operator@sha256:bbb81923102a18e5123d3273684feb69dce22715eeda2330ed47569cc4b60a7d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-operator\u0026tag=v4.6.0-202112201736.p0.gd421c69.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-metering-hadoop@sha256:ca61ce16449acf4e38d0333c3fab0b533b9db6253b2944565c7f4eda2c6a4e96_amd64", "product": { "name": "openshift4/ose-metering-hadoop@sha256:ca61ce16449acf4e38d0333c3fab0b533b9db6253b2944565c7f4eda2c6a4e96_amd64", "product_id": "openshift4/ose-metering-hadoop@sha256:ca61ce16449acf4e38d0333c3fab0b533b9db6253b2944565c7f4eda2c6a4e96_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-hadoop@sha256:ca61ce16449acf4e38d0333c3fab0b533b9db6253b2944565c7f4eda2c6a4e96?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-hadoop\u0026tag=v4.6.0-202112150825.p0.gf381145.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-logging-curator5@sha256:1f9e1c24dae620af738fecb0b2fd36aecdb8f7f433f70c6b5089bb023fd7e9aa_amd64", "product": { "name": "openshift4/ose-logging-curator5@sha256:1f9e1c24dae620af738fecb0b2fd36aecdb8f7f433f70c6b5089bb023fd7e9aa_amd64", "product_id": "openshift4/ose-logging-curator5@sha256:1f9e1c24dae620af738fecb0b2fd36aecdb8f7f433f70c6b5089bb023fd7e9aa_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-curator5@sha256:1f9e1c24dae620af738fecb0b2fd36aecdb8f7f433f70c6b5089bb023fd7e9aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-curator5\u0026tag=v4.6.0-202201061151.p0.gce7f68c.assembly.4.6.53" } } }, { "category": "product_version", "name": "openshift4/ose-logging-elasticsearch6@sha256:f1a53e3be27c714226869b259c8eed80ac797b0cb83fbc2d786a9bba383d9547_amd64", "product": { "name": "openshift4/ose-logging-elasticsearch6@sha256:f1a53e3be27c714226869b259c8eed80ac797b0cb83fbc2d786a9bba383d9547_amd64", "product_id": "openshift4/ose-logging-elasticsearch6@sha256:f1a53e3be27c714226869b259c8eed80ac797b0cb83fbc2d786a9bba383d9547_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-elasticsearch6@sha256:f1a53e3be27c714226869b259c8eed80ac797b0cb83fbc2d786a9bba383d9547?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-elasticsearch6\u0026tag=v4.6.0-202112201736.p0.gce7f68c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-logging-fluentd@sha256:69e442480c0730d9856561a6ddfeb1989383d2d4cdd33944740d38e41ef25fc6_amd64", "product": { "name": "openshift4/ose-logging-fluentd@sha256:69e442480c0730d9856561a6ddfeb1989383d2d4cdd33944740d38e41ef25fc6_amd64", "product_id": "openshift4/ose-logging-fluentd@sha256:69e442480c0730d9856561a6ddfeb1989383d2d4cdd33944740d38e41ef25fc6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-fluentd@sha256:69e442480c0730d9856561a6ddfeb1989383d2d4cdd33944740d38e41ef25fc6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-fluentd\u0026tag=v4.6.0-202112201736.p0.gce7f68c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-logging-kibana6@sha256:f2f672f0ef01723a1097ff08e84b21311441d119d77eee9e65937f47e876311b_amd64", "product": { "name": "openshift4/ose-logging-kibana6@sha256:f2f672f0ef01723a1097ff08e84b21311441d119d77eee9e65937f47e876311b_amd64", "product_id": "openshift4/ose-logging-kibana6@sha256:f2f672f0ef01723a1097ff08e84b21311441d119d77eee9e65937f47e876311b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-kibana6@sha256:f2f672f0ef01723a1097ff08e84b21311441d119d77eee9e65937f47e876311b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-kibana6\u0026tag=v4.6.0-202112201736.p0.gce7f68c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:32ed19af20fdca8aea3ca49bb20e0e34a5b6798655fe78a8dd1db2b0f78d54cd_amd64", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:32ed19af20fdca8aea3ca49bb20e0e34a5b6798655fe78a8dd1db2b0f78d54cd_amd64", "product_id": "openshift4/ose-egress-dns-proxy@sha256:32ed19af20fdca8aea3ca49bb20e0e34a5b6798655fe78a8dd1db2b0f78d54cd_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:32ed19af20fdca8aea3ca49bb20e0e34a5b6798655fe78a8dd1db2b0f78d54cd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.6.0-202112141645.p0.g618b71d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-metering-ansible-operator@sha256:c2ff7992fd5ce33e1d40fc4123f9a479394d31be28b1cceaa5c22a6196ed87a2_amd64", "product": { "name": "openshift4/ose-metering-ansible-operator@sha256:c2ff7992fd5ce33e1d40fc4123f9a479394d31be28b1cceaa5c22a6196ed87a2_amd64", "product_id": "openshift4/ose-metering-ansible-operator@sha256:c2ff7992fd5ce33e1d40fc4123f9a479394d31be28b1cceaa5c22a6196ed87a2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-ansible-operator@sha256:c2ff7992fd5ce33e1d40fc4123f9a479394d31be28b1cceaa5c22a6196ed87a2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-ansible-operator\u0026tag=v4.6.0-202201061005.p0.gd74112d.assembly.4.6.53" } } }, { "category": "product_version", "name": "openshift4/ose-metering-presto@sha256:865fa3774bdc2c5c58fa6b3ea2cee245194945c6a4094a43e9e3c5be4579a12f_amd64", "product": { "name": "openshift4/ose-metering-presto@sha256:865fa3774bdc2c5c58fa6b3ea2cee245194945c6a4094a43e9e3c5be4579a12f_amd64", "product_id": "openshift4/ose-metering-presto@sha256:865fa3774bdc2c5c58fa6b3ea2cee245194945c6a4094a43e9e3c5be4579a12f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-metering-presto@sha256:865fa3774bdc2c5c58fa6b3ea2cee245194945c6a4094a43e9e3c5be4579a12f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-metering-presto\u0026tag=v4.6.0-202112150825.p0.g190688a.assembly.stream" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-logging-operator@sha256:36fb516f19ab985c16b353898a7f50b898adeb1c78a7c2743a0658cb19a05484_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:36fb516f19ab985c16b353898a7f50b898adeb1c78a7c2743a0658cb19a05484_s390x" }, "product_reference": "openshift4/ose-cluster-logging-operator@sha256:36fb516f19ab985c16b353898a7f50b898adeb1c78a7c2743a0658cb19a05484_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-logging-operator@sha256:42f65580290ce0f8c840dc3473e11eaa868e1b53b6793e34681b8e5fff5926eb_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:42f65580290ce0f8c840dc3473e11eaa868e1b53b6793e34681b8e5fff5926eb_ppc64le" }, "product_reference": "openshift4/ose-cluster-logging-operator@sha256:42f65580290ce0f8c840dc3473e11eaa868e1b53b6793e34681b8e5fff5926eb_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-logging-operator@sha256:d101b67692e9d5cca517be23106835124a27e67dc1372f10aebf768210c77441_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:d101b67692e9d5cca517be23106835124a27e67dc1372f10aebf768210c77441_amd64" }, "product_reference": "openshift4/ose-cluster-logging-operator@sha256:d101b67692e9d5cca517be23106835124a27e67dc1372f10aebf768210c77441_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:32ed19af20fdca8aea3ca49bb20e0e34a5b6798655fe78a8dd1db2b0f78d54cd_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:32ed19af20fdca8aea3ca49bb20e0e34a5b6798655fe78a8dd1db2b0f78d54cd_amd64" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:32ed19af20fdca8aea3ca49bb20e0e34a5b6798655fe78a8dd1db2b0f78d54cd_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:8349a4a59394b19bf6a745289c327174523fde41e16f0760fc6ede3ff4782bc7_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:8349a4a59394b19bf6a745289c327174523fde41e16f0760fc6ede3ff4782bc7_s390x" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:8349a4a59394b19bf6a745289c327174523fde41e16f0760fc6ede3ff4782bc7_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:d5810afd8c7d36f44c5130bd4bdcf2215dcc99582d020b1db4a8866606707121_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:d5810afd8c7d36f44c5130bd4bdcf2215dcc99582d020b1db4a8866606707121_ppc64le" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:d5810afd8c7d36f44c5130bd4bdcf2215dcc99582d020b1db4a8866606707121_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator@sha256:b1320c22359023ced54a7df87ae1cc7e81f6dd0879ca9b57db7cfb1492cb109b_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:b1320c22359023ced54a7df87ae1cc7e81f6dd0879ca9b57db7cfb1492cb109b_ppc64le" }, "product_reference": "openshift4/ose-elasticsearch-operator@sha256:b1320c22359023ced54a7df87ae1cc7e81f6dd0879ca9b57db7cfb1492cb109b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator@sha256:bbb81923102a18e5123d3273684feb69dce22715eeda2330ed47569cc4b60a7d_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:bbb81923102a18e5123d3273684feb69dce22715eeda2330ed47569cc4b60a7d_amd64" }, "product_reference": "openshift4/ose-elasticsearch-operator@sha256:bbb81923102a18e5123d3273684feb69dce22715eeda2330ed47569cc4b60a7d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator@sha256:eba0695fa94be0d083f86bc962352699a44357ef02f22e0ef80caedf31150bbe_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:eba0695fa94be0d083f86bc962352699a44357ef02f22e0ef80caedf31150bbe_s390x" }, "product_reference": "openshift4/ose-elasticsearch-operator@sha256:eba0695fa94be0d083f86bc962352699a44357ef02f22e0ef80caedf31150bbe_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-curator5@sha256:1f9e1c24dae620af738fecb0b2fd36aecdb8f7f433f70c6b5089bb023fd7e9aa_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:1f9e1c24dae620af738fecb0b2fd36aecdb8f7f433f70c6b5089bb023fd7e9aa_amd64" }, "product_reference": "openshift4/ose-logging-curator5@sha256:1f9e1c24dae620af738fecb0b2fd36aecdb8f7f433f70c6b5089bb023fd7e9aa_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-curator5@sha256:2e5d5ad2823b8a40bc7fee550f3078e2794b86daf90a73dc2ec2ea06e5488a26_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:2e5d5ad2823b8a40bc7fee550f3078e2794b86daf90a73dc2ec2ea06e5488a26_ppc64le" }, "product_reference": "openshift4/ose-logging-curator5@sha256:2e5d5ad2823b8a40bc7fee550f3078e2794b86daf90a73dc2ec2ea06e5488a26_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-curator5@sha256:d696874a0eeac134653d68d38bc36a57517b93c4be2e16eb9f3f6ad3d2a6bd16_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:d696874a0eeac134653d68d38bc36a57517b93c4be2e16eb9f3f6ad3d2a6bd16_s390x" }, "product_reference": "openshift4/ose-logging-curator5@sha256:d696874a0eeac134653d68d38bc36a57517b93c4be2e16eb9f3f6ad3d2a6bd16_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-elasticsearch6@sha256:169e6882974d9cd36d72e1db75b57071aca7b8cf5aa2c13c8f7e3157505b80c3_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:169e6882974d9cd36d72e1db75b57071aca7b8cf5aa2c13c8f7e3157505b80c3_ppc64le" }, "product_reference": "openshift4/ose-logging-elasticsearch6@sha256:169e6882974d9cd36d72e1db75b57071aca7b8cf5aa2c13c8f7e3157505b80c3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-elasticsearch6@sha256:29643626fe608c5ff0ea815a0afaed3fe7112f6c50963991014542cdb7ece835_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:29643626fe608c5ff0ea815a0afaed3fe7112f6c50963991014542cdb7ece835_s390x" }, "product_reference": "openshift4/ose-logging-elasticsearch6@sha256:29643626fe608c5ff0ea815a0afaed3fe7112f6c50963991014542cdb7ece835_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-elasticsearch6@sha256:f1a53e3be27c714226869b259c8eed80ac797b0cb83fbc2d786a9bba383d9547_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:f1a53e3be27c714226869b259c8eed80ac797b0cb83fbc2d786a9bba383d9547_amd64" }, "product_reference": "openshift4/ose-logging-elasticsearch6@sha256:f1a53e3be27c714226869b259c8eed80ac797b0cb83fbc2d786a9bba383d9547_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-fluentd@sha256:69e442480c0730d9856561a6ddfeb1989383d2d4cdd33944740d38e41ef25fc6_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:69e442480c0730d9856561a6ddfeb1989383d2d4cdd33944740d38e41ef25fc6_amd64" }, "product_reference": "openshift4/ose-logging-fluentd@sha256:69e442480c0730d9856561a6ddfeb1989383d2d4cdd33944740d38e41ef25fc6_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-fluentd@sha256:71abdeda606871f7b84a09debbddf204ee99f42e806b10f0cd17e5d74632757c_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:71abdeda606871f7b84a09debbddf204ee99f42e806b10f0cd17e5d74632757c_ppc64le" }, "product_reference": "openshift4/ose-logging-fluentd@sha256:71abdeda606871f7b84a09debbddf204ee99f42e806b10f0cd17e5d74632757c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-fluentd@sha256:81e179ed88533175874d7f5d34d32a568c6e6b1bd362727305b61f2451dbb060_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:81e179ed88533175874d7f5d34d32a568c6e6b1bd362727305b61f2451dbb060_s390x" }, "product_reference": "openshift4/ose-logging-fluentd@sha256:81e179ed88533175874d7f5d34d32a568c6e6b1bd362727305b61f2451dbb060_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-kibana6@sha256:39b545a87dedd058beab6206b1cac9ed947dbe30a50f26a35aab25e5e59a6e53_s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:39b545a87dedd058beab6206b1cac9ed947dbe30a50f26a35aab25e5e59a6e53_s390x" }, "product_reference": "openshift4/ose-logging-kibana6@sha256:39b545a87dedd058beab6206b1cac9ed947dbe30a50f26a35aab25e5e59a6e53_s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-kibana6@sha256:79aa1de7f02407c2560597368614340d06cf2bd57f500860f75344d70e3b3a5d_ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:79aa1de7f02407c2560597368614340d06cf2bd57f500860f75344d70e3b3a5d_ppc64le" }, "product_reference": "openshift4/ose-logging-kibana6@sha256:79aa1de7f02407c2560597368614340d06cf2bd57f500860f75344d70e3b3a5d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-kibana6@sha256:f2f672f0ef01723a1097ff08e84b21311441d119d77eee9e65937f47e876311b_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:f2f672f0ef01723a1097ff08e84b21311441d119d77eee9e65937f47e876311b_amd64" }, "product_reference": "openshift4/ose-logging-kibana6@sha256:f2f672f0ef01723a1097ff08e84b21311441d119d77eee9e65937f47e876311b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-ansible-operator@sha256:c2ff7992fd5ce33e1d40fc4123f9a479394d31be28b1cceaa5c22a6196ed87a2_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:c2ff7992fd5ce33e1d40fc4123f9a479394d31be28b1cceaa5c22a6196ed87a2_amd64" }, "product_reference": "openshift4/ose-metering-ansible-operator@sha256:c2ff7992fd5ce33e1d40fc4123f9a479394d31be28b1cceaa5c22a6196ed87a2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-hadoop@sha256:ca61ce16449acf4e38d0333c3fab0b533b9db6253b2944565c7f4eda2c6a4e96_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:ca61ce16449acf4e38d0333c3fab0b533b9db6253b2944565c7f4eda2c6a4e96_amd64" }, "product_reference": "openshift4/ose-metering-hadoop@sha256:ca61ce16449acf4e38d0333c3fab0b533b9db6253b2944565c7f4eda2c6a4e96_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-metering-presto@sha256:865fa3774bdc2c5c58fa6b3ea2cee245194945c6a4094a43e9e3c5be4579a12f_amd64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:865fa3774bdc2c5c58fa6b3ea2cee245194945c6a4094a43e9e3c5be4579a12f_amd64" }, "product_reference": "openshift4/ose-metering-presto@sha256:865fa3774bdc2c5c58fa6b3ea2cee245194945c6a4094a43e9e3c5be4579a12f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-45105", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2021-12-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:36fb516f19ab985c16b353898a7f50b898adeb1c78a7c2743a0658cb19a05484_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:42f65580290ce0f8c840dc3473e11eaa868e1b53b6793e34681b8e5fff5926eb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:d101b67692e9d5cca517be23106835124a27e67dc1372f10aebf768210c77441_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:32ed19af20fdca8aea3ca49bb20e0e34a5b6798655fe78a8dd1db2b0f78d54cd_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:8349a4a59394b19bf6a745289c327174523fde41e16f0760fc6ede3ff4782bc7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:d5810afd8c7d36f44c5130bd4bdcf2215dcc99582d020b1db4a8866606707121_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:b1320c22359023ced54a7df87ae1cc7e81f6dd0879ca9b57db7cfb1492cb109b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:bbb81923102a18e5123d3273684feb69dce22715eeda2330ed47569cc4b60a7d_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:eba0695fa94be0d083f86bc962352699a44357ef02f22e0ef80caedf31150bbe_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:1f9e1c24dae620af738fecb0b2fd36aecdb8f7f433f70c6b5089bb023fd7e9aa_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:2e5d5ad2823b8a40bc7fee550f3078e2794b86daf90a73dc2ec2ea06e5488a26_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:d696874a0eeac134653d68d38bc36a57517b93c4be2e16eb9f3f6ad3d2a6bd16_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:69e442480c0730d9856561a6ddfeb1989383d2d4cdd33944740d38e41ef25fc6_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:71abdeda606871f7b84a09debbddf204ee99f42e806b10f0cd17e5d74632757c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:81e179ed88533175874d7f5d34d32a568c6e6b1bd362727305b61f2451dbb060_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:39b545a87dedd058beab6206b1cac9ed947dbe30a50f26a35aab25e5e59a6e53_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:79aa1de7f02407c2560597368614340d06cf2bd57f500860f75344d70e3b3a5d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:f2f672f0ef01723a1097ff08e84b21311441d119d77eee9e65937f47e876311b_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:c2ff7992fd5ce33e1d40fc4123f9a479394d31be28b1cceaa5c22a6196ed87a2_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:ca61ce16449acf4e38d0333c3fab0b533b9db6253b2944565c7f4eda2c6a4e96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:865fa3774bdc2c5c58fa6b3ea2cee245194945c6a4094a43e9e3c5be4579a12f_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034067" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Log4j logging library 2.x. when the logging configuration uses a non-default Pattern Layout with a Context Lookup. Attackers with control over Thread Context Map (MDC) input data can craft malicious input data that contains a recursive lookup and can cause Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has performed an analysis of this flaw and has classified the Attack Complexity(AC) as High because there are multiple factors involved which are beyond attacker\u0027s control:\n\n- The application has to use the logging configuration using a Context Map Lookup (for example, $${ctx:loginId}) which is a non-default Pattern Layout.\n- The application developer has to use the map org.apache.logging.log4j.ThreadContext in the application code and save at-least one key (for example, ThreadContext.put(\"loginId\", \"myId\");) in the ThreadContext map object.\n- Attackers must also know this saved key name in order to exploit this flaw.\n\nNote that saving keys in this map is a non-essential usage of log4j and just an optional feature provided. Refer to https://logging.apache.org/log4j/2.x/manual/lookups.html#ContextMapLookup to know more about the Context Map Lookup feature of Log4j.\n\nLog4j 1.x is not impacted by this vulnerability. Note that only the log4j-core JAR file is impacted by this vulnerability. Applications using ONLY the log4j-api JAR file without the log4j-core JAR file are NOT impacted by this vulnerability.\n\n\nDespite including a vulnerable version of Log4j 2.x, this vulnerability is not exploitable in Elasticsearch[0], as shipped in OpenShift Container Platform and OpenShift Logging. OpenShift 3.11 specifically does not contain any context lookups:\n\nhttps://github.com/openshift/openshift-ansible/blob/release-3.11/roles/openshift_logging_elasticsearch/templates/log4j2.properties.j2\n\nThis vulnerability is therefore rated Low for Elasticsearch in OpenShift Container Platform and OpenShift Logging.\n\n[0] https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476#update-december-18-4", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:169e6882974d9cd36d72e1db75b57071aca7b8cf5aa2c13c8f7e3157505b80c3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:29643626fe608c5ff0ea815a0afaed3fe7112f6c50963991014542cdb7ece835_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:f1a53e3be27c714226869b259c8eed80ac797b0cb83fbc2d786a9bba383d9547_amd64" ], "known_not_affected": [ "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:36fb516f19ab985c16b353898a7f50b898adeb1c78a7c2743a0658cb19a05484_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:42f65580290ce0f8c840dc3473e11eaa868e1b53b6793e34681b8e5fff5926eb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:d101b67692e9d5cca517be23106835124a27e67dc1372f10aebf768210c77441_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:32ed19af20fdca8aea3ca49bb20e0e34a5b6798655fe78a8dd1db2b0f78d54cd_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:8349a4a59394b19bf6a745289c327174523fde41e16f0760fc6ede3ff4782bc7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:d5810afd8c7d36f44c5130bd4bdcf2215dcc99582d020b1db4a8866606707121_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:b1320c22359023ced54a7df87ae1cc7e81f6dd0879ca9b57db7cfb1492cb109b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:bbb81923102a18e5123d3273684feb69dce22715eeda2330ed47569cc4b60a7d_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:eba0695fa94be0d083f86bc962352699a44357ef02f22e0ef80caedf31150bbe_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:1f9e1c24dae620af738fecb0b2fd36aecdb8f7f433f70c6b5089bb023fd7e9aa_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:2e5d5ad2823b8a40bc7fee550f3078e2794b86daf90a73dc2ec2ea06e5488a26_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:d696874a0eeac134653d68d38bc36a57517b93c4be2e16eb9f3f6ad3d2a6bd16_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:69e442480c0730d9856561a6ddfeb1989383d2d4cdd33944740d38e41ef25fc6_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:71abdeda606871f7b84a09debbddf204ee99f42e806b10f0cd17e5d74632757c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:81e179ed88533175874d7f5d34d32a568c6e6b1bd362727305b61f2451dbb060_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:39b545a87dedd058beab6206b1cac9ed947dbe30a50f26a35aab25e5e59a6e53_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:79aa1de7f02407c2560597368614340d06cf2bd57f500860f75344d70e3b3a5d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:f2f672f0ef01723a1097ff08e84b21311441d119d77eee9e65937f47e876311b_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:c2ff7992fd5ce33e1d40fc4123f9a479394d31be28b1cceaa5c22a6196ed87a2_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:ca61ce16449acf4e38d0333c3fab0b533b9db6253b2944565c7f4eda2c6a4e96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:865fa3774bdc2c5c58fa6b3ea2cee245194945c6a4094a43e9e3c5be4579a12f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45105" }, { "category": "external", "summary": "RHBZ#2034067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45105", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45105" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45105", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45105" }, { "category": "external", "summary": "https://issues.apache.org/jira/browse/LOG4J2-3230", "url": "https://issues.apache.org/jira/browse/LOG4J2-3230" }, { "category": "external", "summary": "https://logging.apache.org/log4j/2.x/security.html", "url": "https://logging.apache.org/log4j/2.x/security.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/12/19/1", "url": "https://www.openwall.com/lists/oss-security/2021/12/19/1" } ], "release_date": "2021-12-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-12T09:50:38+00:00", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:169e6882974d9cd36d72e1db75b57071aca7b8cf5aa2c13c8f7e3157505b80c3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:29643626fe608c5ff0ea815a0afaed3fe7112f6c50963991014542cdb7ece835_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:f1a53e3be27c714226869b259c8eed80ac797b0cb83fbc2d786a9bba383d9547_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0026" }, { "category": "workaround", "details": "For Log4j 2 versions up to and including 2.16.0, this flaw can be mitigated by:\n- In PatternLayout in the Log4j logging configuration, replace Context Lookups like ${ctx:loginId} or $${ctx:loginId} with Thread Context Map patterns (%X, %mdc, or %MDC) like %X{loginId}.\n- Otherwise, in the Log4j logging configuration, remove references to Context Lookups like ${ctx:loginId} or $${ctx:loginId} where they originate from sources external to the application such as HTTP headers or user input.", "product_ids": [ "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:36fb516f19ab985c16b353898a7f50b898adeb1c78a7c2743a0658cb19a05484_s390x", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:42f65580290ce0f8c840dc3473e11eaa868e1b53b6793e34681b8e5fff5926eb_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-cluster-logging-operator@sha256:d101b67692e9d5cca517be23106835124a27e67dc1372f10aebf768210c77441_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:32ed19af20fdca8aea3ca49bb20e0e34a5b6798655fe78a8dd1db2b0f78d54cd_amd64", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:8349a4a59394b19bf6a745289c327174523fde41e16f0760fc6ede3ff4782bc7_s390x", "8Base-RHOSE-4.6:openshift4/ose-egress-dns-proxy@sha256:d5810afd8c7d36f44c5130bd4bdcf2215dcc99582d020b1db4a8866606707121_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:b1320c22359023ced54a7df87ae1cc7e81f6dd0879ca9b57db7cfb1492cb109b_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:bbb81923102a18e5123d3273684feb69dce22715eeda2330ed47569cc4b60a7d_amd64", "8Base-RHOSE-4.6:openshift4/ose-elasticsearch-operator@sha256:eba0695fa94be0d083f86bc962352699a44357ef02f22e0ef80caedf31150bbe_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:1f9e1c24dae620af738fecb0b2fd36aecdb8f7f433f70c6b5089bb023fd7e9aa_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:2e5d5ad2823b8a40bc7fee550f3078e2794b86daf90a73dc2ec2ea06e5488a26_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-curator5@sha256:d696874a0eeac134653d68d38bc36a57517b93c4be2e16eb9f3f6ad3d2a6bd16_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:169e6882974d9cd36d72e1db75b57071aca7b8cf5aa2c13c8f7e3157505b80c3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:29643626fe608c5ff0ea815a0afaed3fe7112f6c50963991014542cdb7ece835_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:f1a53e3be27c714226869b259c8eed80ac797b0cb83fbc2d786a9bba383d9547_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:69e442480c0730d9856561a6ddfeb1989383d2d4cdd33944740d38e41ef25fc6_amd64", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:71abdeda606871f7b84a09debbddf204ee99f42e806b10f0cd17e5d74632757c_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-fluentd@sha256:81e179ed88533175874d7f5d34d32a568c6e6b1bd362727305b61f2451dbb060_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:39b545a87dedd058beab6206b1cac9ed947dbe30a50f26a35aab25e5e59a6e53_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:79aa1de7f02407c2560597368614340d06cf2bd57f500860f75344d70e3b3a5d_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-kibana6@sha256:f2f672f0ef01723a1097ff08e84b21311441d119d77eee9e65937f47e876311b_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-ansible-operator@sha256:c2ff7992fd5ce33e1d40fc4123f9a479394d31be28b1cceaa5c22a6196ed87a2_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-hadoop@sha256:ca61ce16449acf4e38d0333c3fab0b533b9db6253b2944565c7f4eda2c6a4e96_amd64", "8Base-RHOSE-4.6:openshift4/ose-metering-presto@sha256:865fa3774bdc2c5c58fa6b3ea2cee245194945c6a4094a43e9e3c5be4579a12f_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:169e6882974d9cd36d72e1db75b57071aca7b8cf5aa2c13c8f7e3157505b80c3_ppc64le", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:29643626fe608c5ff0ea815a0afaed3fe7112f6c50963991014542cdb7ece835_s390x", "8Base-RHOSE-4.6:openshift4/ose-logging-elasticsearch6@sha256:f1a53e3be27c714226869b259c8eed80ac797b0cb83fbc2d786a9bba383d9547_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.