Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in Logging
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in Logging
ID: RHSA-2022:1461-01
Distribution: Red Hat
Plattformen: Red Hat Logging Subsystem for Red Hat OpenShift
Datum: Do, 21. April 2022, 22:26
Referenzen: https://access.redhat.com/security/cve/CVE-2022-21698
https://access.redhat.com/security/cve/CVE-2022-0759
Applikationen: Logging

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: Logging Subsystem 5.4 - Red Hat OpenShift
Security and Bug update
Advisory ID: RHSA-2022:1461-01
Product: Logging Subsystem for Red Hat OpenShift
Advisory URL: https://access.redhat.com/errata/RHSA-2022:1461
Issue date: 2022-04-20
CVE Names: CVE-2022-0759 CVE-2022-21698
=====================================================================

1. Summary:

Logging Subsystem 5.4 - Red Hat OpenShift

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Logging Subsystem 5.4 - Red Hat OpenShift

Security Fix(es):

* kubeclient: kubeconfig parsing error can lead to MITM attacks
(CVE-2022-0759)

* prometheus/client_golang: Denial of service using
InstrumentHandlerCounter (CVE-2022-21698)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For OpenShift Container Platform 4.10 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this errata update:

https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html

For Red Hat OpenShift Logging 5.4, see the following instructions to apply
this update:

https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html

4. Bugs fixed (https://bugzilla.redhat.com/):

2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using
InstrumentHandlerCounter
2058404 - CVE-2022-0759 kubeclient: kubeconfig parsing error can lead to MITM
attacks

5. JIRA issues fixed (https://issues.jboss.org/):

LOG-1774 - The collector logs should be excluded in fluent.conf
LOG-1896 - CLO panic: runtime error: slice bounds out of range [:-1]
LOG-1899 - http.max_header_size set to 128kb causes communication with
elasticsearch to stop working
LOG-1912 - Vector image ref breaks 5.3 build
LOG-1918 - Alert `FluentdNodeDown` always firing
LOG-1919 - Logging link is not removed when CLO is uninstalled or its instance
is removed
LOG-2026 - No datapoint for CPU on openshift-logging dashboard
LOG-2052 - [vector]Infra logs aren't collected correctly
LOG-2056 - Wrong certificates used by fluentd when log forwarding to external
Elasticsearch and defined structuredTypeKey
LOG-2069 - [release-5.4]Log collected dashboard displays wrong namespace
LOG-2070 - [Vector] Collector pods fail to start when a ClusterLogForwarder is
created to forward logs to Kafka.
LOG-2071 - [release-5.4] The configmap grafana-dashboard-cluster-logging can
not be updated
LOG-2072 - [Vector] Collector pods fail to start when a ClusterLogForwarder
instance is created to forward logs to multiple log stores.
LOG-2076 - [Vector] Basic auth credentials are not added to the generated
Vector config
LOG-2093 - EO Self-generated certificates issue with Kibana when
"logging.openshift.io/elasticsearch-cert-management: true" annotation is used
LOG-2099 - [release-5.4] Events listing out of order in Kibana 6.8.1
LOG-2107 - CLO instance to deploy Vector not working.
LOG-2115 - Incident: Loki Ingester experiencing 50% errors.
LOG-2119 - Elasticsearch pod is throwing ElasticsearchSecurityException when
running delete by query
LOG-2120 - EO becomes CrashLoopBackOff when deploy ES with more than 3 nodes
LOG-2121 - LokiStack components/pods are not coming up due to CrashLoopBackOff
error
LOG-2124 - Binary Manager issue in downstream Loki Operator image
LOG-2130 - Vector - Collector pods fails to start when forwarding logs to Loki
using tenantKey
LOG-2131 - ES Operator Stuck on Quota after Upgrade
LOG-2156 - Dashboard for OpenShift Logging in WebConsole shows incorrect number
of shards
LOG-2157 - Vector: Getting error 'error=unknown field `username`' when
forwarding logs to Loki using HTTPS
LOG-2160 - [Logging 5.4]Logs under openshift-* projects are sent to app* index
when using fluentd as collector
LOG-2161 - Cronjob elasticsearch-im-prune-app keeps recreating after enabling
delete by query
LOG-2163 - Openshift Logging Dashboard is not available in console
LOG-2166 - [Vector]CLO doesn't create correct configurations when
forwarding different type logs to different log stores.
LOG-2171 - [Logging 5.4]ES pods can't be ready after removing
secret/signing-elasticsearch
LOG-2174 - [vector] ES rejects logs due to MapperParsingException
LOG-2210 - Delete by query doesn't delete all the projects' logs
defined in retentionPolicy
LOG-2211 - [loki-operator]The kube-rbac-proxy is too old ( v4.5.0)
LOG-2212 - [loki-operator] Configure Error in ClusterServiceVersion
LOG-2218 - support ARM64 for loki-operator images
LOG-2220 - Fluentd collector not setting labels from /var/log/pods paths
LOG-2221 - The lokistack deployment should continue after the missing secret is
created
LOG-2224 - LokiStack components are not restarted on ConfigMap change
LOG-2226 - [loki-operator] Must use the global namespace openshift-operators or
openshift-operators-redhat
LOG-2236 - An inner error is swallowed
LOG-2246 - [loki-operator] Degraded status immediately reset when no pod
actions are pending
LOG-2249 - [Vector] Incorrect sinks.loki_server.labels config for
kubernetes_host and kubernetes_namespace_name
LOG-2250 - [Logging 5.4] EO doesn't recreate secrets kibana and
kibana-proxy after removing them.
LOG-2255 - [Vector] Forwarder does not handle input namespace selectors.
LOG-2259 - [Vector] Configuration error ?error=redefinition of table? when
forwarding logs from different namespaces.
LOG-2278 - [loki-operator] SRV lookup for components fails because of service
name mismatch
LOG-2286 - Prometheus can't watch pods/endpoints/services in
openshift-logging namespace when only the CLO is deployed.
LOG-2299 - Loki tenant configuration invalid for fluentd output plugin used
LOG-2302 - [Logging 5.4] Elasticsearch cluster upgrade stuck
LOG-2327 - [loki-operator] Loki components report connection errors related to
kube-probe
LOG-2351 - [Logging 5.4] Kibana pod can't connect to ES cluster after
removing secret/signing-elasticsearch: "x509: certificate signed by unknown authority"
LOG-2352 - loki-operator controller pod in CrashLoopBackOff status
LOG-2373 - [release-5.4] Logging link should contain an icon
LOG-2375 - Vector preview does not update Status
LOG-2379 - [release-5.4] Allow users to tune fluentd
LOG-2381 - [Vector] [5.4] Collector pods fail to start with configuration
error=unknown variant `internal_metrics`
LOG-2383 - The lokistack still bind s3 when secret.type is azure
LOG-2392 - CLO's loki output url is parsed wrongly
LOG-2397 - Reconcile Error on Loki controller manager after LokiStack size is
changed
LOG-2398 - [Vector][5.4] Journal logs not reaching Elasticsearch output
LOG-2425 - lokistack: Common users can not view their pods logs
LOG-2430 - Enable vector functional and e2e tests for preview, or document gaps
LOG-2438 - api/logs/v1/audit/loki/api/v1/push 302 Found failed to find token
LOG-2441 - Remove OpenShift 4.8 from Logging 5.4 support list
LOG-2462 - Fluentd collected metric should track either /var/log/pods or
/var/log/containers
LOG-2487 - The loki-operator can not be upgraded

6. References:

https://access.redhat.com/security/cve/CVE-2022-0759
https://access.redhat.com/security/cve/CVE-2022-21698
https://access.redhat.com/security/updates/classification/#important

7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYmGDYtzjgjWX9erEAQjESBAAjEvyQPIYiTjNuT+jg44CUTA8WCHTNtqk
CQIEO3lu0fA/JGY2gVihGN+CwqM/5NNy/th8fsO11Zu26D5ldIqW6ll82Ms05zpK
JHidM+vTuP9fQDXti+rK91k7VusQSFCFyh1zQtqqiyGNKX459o2SKm3LtMGS70l0
qk9wh09qJtXBOV7ibAlB3Gx0qcC7H1bT0U8WzZVWUSpkr77c9UnvF9wntBu/Lsra
9aieeU3LHuy8VYcZ7oovj6t1+2bDTgxFRT7JqlzxlsW4yGm5mAxlQya9y5OC46+8
H7xwK5Qgi7043QWejplJPGuJq79GkYTxdXQE6jLyfRIIzj/Jcl3ViJi7nuCe5mn9
x5EYpiGzqXUh8kPilDUz/I+wGA9AnPV+Wn3v6PkqQ255ngUmOBobhfLLj/v5O74q
ukyItuBHllYHhNI71phW0kbrmJV/Q+NlM1IMgdmMJySUMi0FpeKcFg+HumDuiM6E
ufs6AHyhEB/kkdQ4OhC6Kcmw+wAxlUEm5Kmhi4Hv+9IzP+bvAz0tNRzoOxnUuC7S
dKW0UYVRKDhBnKt5vnuUoJkcVOiRflXia/U4ffQk7KxSFsDO8uT0sqrrE0LHKdzK
uKeukACBx62Op/g/kXaX5AuDFDb3T3LLjbGYGyqYvRnCfbV1JUM0pk+9LNw0bhCs
f0G9+CqiVLw=
=Je3i
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung