-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Logging Subsystem 5.4 - Red Hat OpenShift Security and Bug update
Advisory ID:       RHSA-2022:1461-01
Product:           Logging Subsystem for Red Hat OpenShift
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:1461
Issue date:        2022-04-20
CVE Names:         CVE-2022-0759 CVE-2022-21698 
=====================================================================

1. Summary:

Logging Subsystem 5.4 - Red Hat OpenShift

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Logging Subsystem 5.4 - Red Hat OpenShift

Security Fix(es):

* kubeclient: kubeconfig parsing error can lead to MITM attacks
(CVE-2022-0759)

* prometheus/client_golang: Denial of service using
InstrumentHandlerCounter (CVE-2022-21698)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For OpenShift Container Platform 4.10 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this errata update:

https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html

For Red Hat OpenShift Logging 5.4, see the following instructions to apply
this update:

https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html

4. Bugs fixed (https://bugzilla.redhat.com/):

2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter
2058404 - CVE-2022-0759 kubeclient: kubeconfig parsing error can lead to MITM attacks

5. JIRA issues fixed (https://issues.jboss.org/):

LOG-1774 - The collector logs should  be excluded in fluent.conf
LOG-1896 - CLO panic: runtime error: slice bounds out of range [:-1]
LOG-1899 - http.max_header_size set to 128kb causes communication with elasticsearch to stop working
LOG-1912 - Vector image ref breaks 5.3 build
LOG-1918 - Alert `FluentdNodeDown` always firing 
LOG-1919 - Logging link is not removed when CLO is uninstalled or its instance is removed
LOG-2026 - No datapoint for CPU on openshift-logging dashboard
LOG-2052 - [vector]Infra logs aren't collected correctly
LOG-2056 - Wrong certificates used by fluentd when log forwarding to external Elasticsearch and defined structuredTypeKey 
LOG-2069 - [release-5.4]Log collected dashboard displays wrong namespace
LOG-2070 - [Vector] Collector pods fail to start when a ClusterLogForwarder is created to forward logs to Kafka.
LOG-2071 - [release-5.4] The configmap grafana-dashboard-cluster-logging can not be updated
LOG-2072 - [Vector] Collector pods fail to start when a ClusterLogForwarder instance is created to forward logs to multiple log stores.
LOG-2076 - [Vector] Basic auth credentials are not added to the generated Vector config
LOG-2093 - EO Self-generated certificates issue with Kibana when "logging.openshift.io/elasticsearch-cert-management: true" annotation is used
LOG-2099 - [release-5.4] Events listing out of order in Kibana 6.8.1
LOG-2107 - CLO instance to deploy Vector not working. 
LOG-2115 - Incident: Loki Ingester experiencing 50% errors.
LOG-2119 - Elasticsearch pod is throwing ElasticsearchSecurityException when running delete by query
LOG-2120 - EO becomes CrashLoopBackOff when deploy ES with more than 3 nodes
LOG-2121 - LokiStack components/pods are not coming up due to CrashLoopBackOff error
LOG-2124 - Binary Manager issue in downstream Loki Operator image
LOG-2130 - Vector - Collector pods fails to start when forwarding logs to Loki using tenantKey
LOG-2131 - ES Operator Stuck on Quota after Upgrade
LOG-2156 - Dashboard for OpenShift Logging in WebConsole shows incorrect number of shards
LOG-2157 - Vector: Getting error 'error=unknown field `username`' when forwarding logs to Loki using HTTPS
LOG-2160 - [Logging 5.4]Logs under openshift-* projects are sent to app* index when using fluentd as collector
LOG-2161 - Cronjob elasticsearch-im-prune-app keeps recreating after enabling delete by query
LOG-2163 - Openshift Logging Dashboard is not available in console
LOG-2166 - [Vector]CLO doesn't create correct configurations when forwarding different type logs to different log stores.
LOG-2171 - [Logging 5.4]ES pods can't be ready after removing secret/signing-elasticsearch
LOG-2174 - [vector] ES rejects logs due to MapperParsingException
LOG-2210 - Delete by query doesn't delete all the projects' logs defined in retentionPolicy
LOG-2211 - [loki-operator]The kube-rbac-proxy is too old ( v4.5.0)
LOG-2212 - [loki-operator] Configure Error in ClusterServiceVersion
LOG-2218 - support ARM64 for loki-operator images
LOG-2220 - Fluentd collector not setting labels from /var/log/pods paths
LOG-2221 - The lokistack deployment should continue after the missing secret is created
LOG-2224 - LokiStack components are not restarted on ConfigMap change
LOG-2226 - [loki-operator] Must use the global namespace openshift-operators or openshift-operators-redhat
LOG-2236 - An inner error is swallowed
LOG-2246 - [loki-operator] Degraded status immediately reset when no pod actions are pending
LOG-2249 - [Vector] Incorrect sinks.loki_server.labels config for kubernetes_host and kubernetes_namespace_name
LOG-2250 - [Logging 5.4] EO doesn't recreate secrets kibana and kibana-proxy after removing them.
LOG-2255 - [Vector] Forwarder does not handle input namespace selectors.
LOG-2259 - [Vector] Configuration error ?error=redefinition of table? when forwarding logs from different namespaces.
LOG-2278 - [loki-operator] SRV lookup for components fails because of service name mismatch
LOG-2286 - Prometheus can't watch pods/endpoints/services in openshift-logging namespace when only the CLO is deployed. 
LOG-2299 - Loki tenant configuration invalid for fluentd output plugin used
LOG-2302 - [Logging 5.4] Elasticsearch cluster upgrade stuck
LOG-2327 - [loki-operator] Loki components report connection errors related to kube-probe
LOG-2351 - [Logging 5.4] Kibana pod can't connect to ES cluster after removing secret/signing-elasticsearch: "x509: certificate signed by unknown authority"
LOG-2352 - loki-operator controller pod in CrashLoopBackOff status
LOG-2373 - [release-5.4] Logging link should contain an icon
LOG-2375 - Vector preview does not update Status 
LOG-2379 - [release-5.4] Allow users to tune fluentd
LOG-2381 - [Vector] [5.4] Collector pods fail to start with configuration error=unknown variant `internal_metrics`
LOG-2383 - The lokistack still bind s3 when secret.type is azure
LOG-2392 - CLO's loki output url is parsed wrongly
LOG-2397 - Reconcile Error on Loki controller manager after LokiStack size is changed
LOG-2398 - [Vector][5.4] Journal logs not reaching Elasticsearch output
LOG-2425 - lokistack: Common users can not view their pods logs
LOG-2430 - Enable vector functional and e2e tests for preview, or document gaps
LOG-2438 - api/logs/v1/audit/loki/api/v1/push 302 Found failed to find token
LOG-2441 - Remove OpenShift 4.8 from Logging 5.4 support list
LOG-2462 - Fluentd collected metric should track either /var/log/pods or /var/log/containers
LOG-2487 - The loki-operator can not be upgraded

6. References:

https://access.redhat.com/security/cve/CVE-2022-0759
https://access.redhat.com/security/cve/CVE-2022-21698
https://access.redhat.com/security/updates/classification/#important

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Je3i
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce