RedHat: RHSA-2022-6560:01 Moderate: Openshift Logging Bug Fix Relea...
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Openshift Logging Bug Fix Release and Security Update (5.3.12)
Advisory ID:       RHSA-2022:6560-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:6560
Issue date:        2022-09-26
CVE Names:         CVE-2015-20107 CVE-2022-0391 CVE-2022-21123 
                   CVE-2022-21125 CVE-2022-21166 CVE-2022-29154 
                   CVE-2022-30631 CVE-2022-32206 CVE-2022-32208 
                   CVE-2022-34903 
=====================================================================

1. Summary:

An update is now available for OpenShift Logging 5.3.12

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Openshift Logging Bug Fix Release (5.3.12)

Security Fix(es):

* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For OpenShift Container Platform 4.9 see the following documentation, which
will be updated shortly, for detailed release notes:

https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-release-notes.html

For Red Hat OpenShift Logging 5.3, see the following instructions to apply
this update:

https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html

4. Bugs fixed (https://bugzilla.redhat.com/):

2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read

5. References:

https://access.redhat.com/security/cve/CVE-2015-20107
https://access.redhat.com/security/cve/CVE-2022-0391
https://access.redhat.com/security/cve/CVE-2022-21123
https://access.redhat.com/security/cve/CVE-2022-21125
https://access.redhat.com/security/cve/CVE-2022-21166
https://access.redhat.com/security/cve/CVE-2022-29154
https://access.redhat.com/security/cve/CVE-2022-30631
https://access.redhat.com/security/cve/CVE-2022-32206
https://access.redhat.com/security/cve/CVE-2022-32208
https://access.redhat.com/security/cve/CVE-2022-34903
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYzGfoNzjgjWX9erEAQhCjxAAgzlIinDNawReUfoKAlsDPbKIc8xMDbUc
ZnCVYDqXaO+31Cbz7wfOUczVoH1GdYwZovnvOF80NzErNglScay54z3NKrT9oaBq
EjYHEmlmtX7oVsSugqIu9ZDjs3TXqiOrqdajZq90QPfyFLzaPzLsdK8ehav7ceWB
Mf9XF8HtNvo+kNcR/Q3Hb6Ky7aR+13dGjjvnE9N/QLnAnYnZKxuU0cnoZhipO08D
NyN3Gl3jij7tIioPJhMGkj2Wk1qjJ38Kf3lEhPR1sLA7zj5deFYRNdKHzlNt/BXu
tAy8zfbnul5aLSTg6bxSTE/Hz/PFFuMvrA/A6Zd+NXcqz+L97ckDGyhp3KpuuweF
GoEx4J2Gm8vTgUeolylDuqnQu9o2MZInHAFu/ytdYXGocf0sj74kls0XsuRYayjz
RJD3TzacuQ3qHQpmcshStkOqsf4R8ku1EqI9ujX2qu9xqDY8p9kCcUH/oOviqxQY
o2Jw3gP7qBrGAnN3q6G8lv8yN8DptAmPZWhEbZYUgg7PAFg9XyDbWx5y++bO9HF5
9sbcRxJUKE95GGQKqzlKu2qLzOkr3GU+VJlRCFE3YEsEmsT5OizcanxWfQTo1xfE
NTfz4K4YmSyGoAHpK3VVY1LeYPGkn1JEYm9YUDo7M1lSWhB6woUSaemzOKjo7q5l
2sPnYAn2mZY=
=BEHo
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-6560:01 Moderate: Openshift Logging Bug Fix Release and

An update is now available for OpenShift Logging 5.3.12 Red Hat Product Security has rated this update as having a security impact of Moderate

Summary

Openshift Logging Bug Fix Release (5.3.12)
Security Fix(es):
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For OpenShift Container Platform 4.9 see the following documentation, whichwill be updated shortly, for detailed release notes:https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-release-notes.htmlFor Red Hat OpenShift Logging 5.3, see the following instructions to applythis update:https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html

References

https://access.redhat.com/security/cve/CVE-2015-20107 https://access.redhat.com/security/cve/CVE-2022-0391 https://access.redhat.com/security/cve/CVE-2022-21123 https://access.redhat.com/security/cve/CVE-2022-21125 https://access.redhat.com/security/cve/CVE-2022-21166 https://access.redhat.com/security/cve/CVE-2022-29154 https://access.redhat.com/security/cve/CVE-2022-30631 https://access.redhat.com/security/cve/CVE-2022-32206 https://access.redhat.com/security/cve/CVE-2022-32208 https://access.redhat.com/security/cve/CVE-2022-34903 https://access.redhat.com/security/updates/classification/#moderate

Package List

Severity
Advisory ID: RHSA-2022:6560-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2022:6560
Issued Date: : 2022-09-26
CVE Names: CVE-2015-20107 CVE-2022-0391 CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-29154 CVE-2022-30631 CVE-2022-32206 CVE-2022-32208 CVE-2022-34903

Topic

An update is now available for OpenShift Logging 5.3.12Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.

Relevant Releases Architectures

Bugs Fixed

2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.