-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Openshift Logging Bug Fix Release and Security Update (5.3.12) Advisory ID: RHSA-2022:6560-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2022:6560 Issue date: 2022-09-26 CVE Names: CVE-2015-20107 CVE-2022-0391 CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-29154 CVE-2022-30631 CVE-2022-32206 CVE-2022-32208 CVE-2022-34903 ===================================================================== 1. Summary: An update is now available for OpenShift Logging 5.3.12 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Openshift Logging Bug Fix Release (5.3.12) Security Fix(es): * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly, for detailed release notes: https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-release-notes.html For Red Hat OpenShift Logging 5.3, see the following instructions to apply this update: https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read 5. References: https://access.redhat.com/security/cve/CVE-2015-20107 https://access.redhat.com/security/cve/CVE-2022-0391 https://access.redhat.com/security/cve/CVE-2022-21123 https://access.redhat.com/security/cve/CVE-2022-21125 https://access.redhat.com/security/cve/CVE-2022-21166 https://access.redhat.com/security/cve/CVE-2022-29154 https://access.redhat.com/security/cve/CVE-2022-30631 https://access.redhat.com/security/cve/CVE-2022-32206 https://access.redhat.com/security/cve/CVE-2022-32208 https://access.redhat.com/security/cve/CVE-2022-34903 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYzGfoNzjgjWX9erEAQhCjxAAgzlIinDNawReUfoKAlsDPbKIc8xMDbUc ZnCVYDqXaO+31Cbz7wfOUczVoH1GdYwZovnvOF80NzErNglScay54z3NKrT9oaBq EjYHEmlmtX7oVsSugqIu9ZDjs3TXqiOrqdajZq90QPfyFLzaPzLsdK8ehav7ceWB Mf9XF8HtNvo+kNcR/Q3Hb6Ky7aR+13dGjjvnE9N/QLnAnYnZKxuU0cnoZhipO08D NyN3Gl3jij7tIioPJhMGkj2Wk1qjJ38Kf3lEhPR1sLA7zj5deFYRNdKHzlNt/BXu tAy8zfbnul5aLSTg6bxSTE/Hz/PFFuMvrA/A6Zd+NXcqz+L97ckDGyhp3KpuuweF GoEx4J2Gm8vTgUeolylDuqnQu9o2MZInHAFu/ytdYXGocf0sj74kls0XsuRYayjz RJD3TzacuQ3qHQpmcshStkOqsf4R8ku1EqI9ujX2qu9xqDY8p9kCcUH/oOviqxQY o2Jw3gP7qBrGAnN3q6G8lv8yN8DptAmPZWhEbZYUgg7PAFg9XyDbWx5y++bO9HF5 9sbcRxJUKE95GGQKqzlKu2qLzOkr3GU+VJlRCFE3YEsEmsT5OizcanxWfQTo1xfE NTfz4K4YmSyGoAHpK3VVY1LeYPGkn1JEYm9YUDo7M1lSWhB6woUSaemzOKjo7q5l 2sPnYAn2mZY= =BEHo -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce