-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Logging Subsystem 5.7.3 - Red Hat OpenShift security update
Advisory ID:       RHSA-2023:3998-01
Product:           Logging Subsystem for Red Hat OpenShift
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:3998
Issue date:        2023-07-12
CVE Names:         CVE-2020-24736 CVE-2022-48281 CVE-2023-1667 
                   CVE-2023-2283 CVE-2023-24329 CVE-2023-26115 
                   CVE-2023-26136 CVE-2023-26604 CVE-2023-28466 
====================================================================
1. Summary:

An update is now available for Red Hat OpenShift Logging Subsystem 5.7.3 

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Logging Subsystem 5.7.3 - Red Hat OpenShift

Security Fix(es):

* word-wrap: ReDoS (CVE-2023-26115)

* tough-cookie: prototype pollution in cookie memstore (CVE-2023-26136)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2216827 - CVE-2023-26115 word-wrap: ReDoS
2219310 - CVE-2023-26136 tough-cookie: prototype pollution in cookie memstore

5. JIRA issues fixed (https://issues.redhat.com/):

LOG-3498 - Loki returning timed out after 30000ms 
LOG-4095 - loki labelKeys with slashes break in 5.7
LOG-4100 - [release-5.7] Browser keeps plugin files cached after upgrade
LOG-4108 - [release-5.7] Custom time range is not getting updated on Aggregated Logs page
LOG-4156 - [release-5.7] Degraded condition on LokiStack is reset even when it should persist
LOG-4161 - [release-5.7] Ruler does not restart after updates to RulerConfig CR.
LOG-4176 - [release-5.7 ]Vector in CrashLoopBackOff when using matchLabel containing special character /
LOG-4177 - CLO pod crash if CLF is updated when CL in Unmanagment status
LOG-4198 - [release-5.7] Controller crashes when only per tenant limits are defined in LokiStack CR
LOG-4258 - Fluentd fails when configured passphase sending to Elasticsearch
LOG-4264 - [release-5.7] Update ose-kube-rbac-proxy to v4.10+
LOG-4271 - [release-5.7] Fix kibana packaging in order for it to be properly scanned by prod sec
LOG-4277 - [release-5.7] HTTP request header again too big, causing interaction with elasticsearch to fail

6. References:

https://access.redhat.com/security/cve/CVE-2020-24736
https://access.redhat.com/security/cve/CVE-2022-48281
https://access.redhat.com/security/cve/CVE-2023-1667
https://access.redhat.com/security/cve/CVE-2023-2283
https://access.redhat.com/security/cve/CVE-2023-24329
https://access.redhat.com/security/cve/CVE-2023-26115
https://access.redhat.com/security/cve/CVE-2023-26136
https://access.redhat.com/security/cve/CVE-2023-26604
https://access.redhat.com/security/cve/CVE-2023-28466
https://access.redhat.com/security/updates/classification/#moderate

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=5Dvx
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-3998:01 Moderate: Logging Subsystem 5.7.3 - Red Hat

An update is now available for Red Hat OpenShift Logging Subsystem 5.7.3 Red Hat Product Security has rated this update as having a security impact of Moderate

Summary

Logging Subsystem 5.7.3 - Red Hat OpenShift
Security Fix(es):
* word-wrap: ReDoS (CVE-2023-26115)
* tough-cookie: prototype pollution in cookie memstore (CVE-2023-26136)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2020-24736 https://access.redhat.com/security/cve/CVE-2022-48281 https://access.redhat.com/security/cve/CVE-2023-1667 https://access.redhat.com/security/cve/CVE-2023-2283 https://access.redhat.com/security/cve/CVE-2023-24329 https://access.redhat.com/security/cve/CVE-2023-26115 https://access.redhat.com/security/cve/CVE-2023-26136 https://access.redhat.com/security/cve/CVE-2023-26604 https://access.redhat.com/security/cve/CVE-2023-28466 https://access.redhat.com/security/updates/classification/#moderate

Package List


Severity
Advisory ID: RHSA-2023:3998-01
Product: Logging Subsystem for Red Hat OpenShift
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3998
Issued Date: : 2023-07-12
CVE Names: CVE-2020-24736 CVE-2022-48281 CVE-2023-1667 CVE-2023-2283 CVE-2023-24329 CVE-2023-26115 CVE-2023-26136 CVE-2023-26604 CVE-2023-28466

Topic

An update is now available for Red Hat OpenShift Logging Subsystem 5.7.3 Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2216827 - CVE-2023-26115 word-wrap: ReDoS

2219310 - CVE-2023-26136 tough-cookie: prototype pollution in cookie memstore

5. JIRA issues fixed (https://issues.redhat.com/):

LOG-3498 - Loki returning timed out after 30000ms

LOG-4095 - loki labelKeys with slashes break in 5.7

LOG-4100 - [release-5.7] Browser keeps plugin files cached after upgrade

LOG-4108 - [release-5.7] Custom time range is not getting updated on Aggregated Logs page

LOG-4156 - [release-5.7] Degraded condition on LokiStack is reset even when it should persist

LOG-4161 - [release-5.7] Ruler does not restart after updates to RulerConfig CR.

LOG-4176 - [release-5.7 ]Vector in CrashLoopBackOff when using matchLabel containing special character /

LOG-4177 - CLO pod crash if CLF is updated when CL in Unmanagment status

LOG-4198 - [release-5.7] Controller crashes when only per tenant limits are defined in LokiStack CR

LOG-4258 - Fluentd fails when configured passphase sending to Elasticsearch

LOG-4264 - [release-5.7] Update ose-kube-rbac-proxy to v4.10+

LOG-4271 - [release-5.7] Fix kibana packaging in order for it to be properly scanned by prod sec

LOG-4277 - [release-5.7] HTTP request header again too big, causing interaction with elasticsearch to fail


Related News