A Red Hat Data Grid 8.2.2 security update has been released.
RHSA-2021:5132-02: Critical: Red Hat Data Grid 8.2.2 security update
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: Red Hat Data Grid 8.2.2 security update
Advisory ID: RHSA-2021:5132-01
Product: Red Hat JBoss Data Grid
Advisory URL: https://access.redhat.com/errata/RHSA-2021:5132
Issue date: 2021-12-14
CVE Names: CVE-2021-44228
=====================================================================
1. Summary:
An update for Red Hat Data Grid is now available.
Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Description:
Red Hat Data Grid is an in-memory, distributed, NoSQL datastore solution.
It increases application response times and allows for dramatically
improving performance while providing availability, reliability, and
elastic scale.
Data Grid 8.2.2 replaces Data Grid 8.2.1 and includes bug fixes and
enhancements. Find out more about Data Grid 8.2.2 in the Release Notes [3].
Security Fix(es):
* log4j-core: Remote code execution in Log4j 2.x when logs contain an
attacker-controlled string value (CVE-2021-44228)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
3. Solution:
To install this update, do the following:
1. Download the Data Grid 8.2.2 server patch from the customer portal[²].
2. Back up your existing Data Grid installation. You should back up
databases, configuration files, and so on.
3. Install the Data Grid 8.2.2 server patch. Refer to the 8.2.2 Release
Notes[³] for patching instructions.
4. Restart Data Grid to ensure the changes take effect.
4. Bugs fixed ( https://bugzilla.redhat.com/):
2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value
5. References:
https://access.redhat.com/security/cve/CVE-2021-44228
https://access.redhat.com/security/updates/classification/#critical
https://access.redhat.com/jbossnetwork/restricted/softwareDetail.html?softwareId=70381&product=data.grid&version=8.2&downloadType=patches
https://access.redhat.com/documentation/en-us/red_hat_data_grid/8.2/html-single/red_hat_data_grid_8.2_release_notes/index
https://access.redhat.com/security/vulnerabilities/RHSB-2021-009
6. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.