First published: Tue Sep 06 2022(Updated: )
Logging Subsystem 5.4.5 - Red Hat OpenShift<br>Security Fix(es):<br><li> golang: net/<a href="http:" target="_blank">http:</a> improper sanitization of Transfer-Encoding header (CVE-2022-1705)</li> <li> golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)</li> <li> golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:6183 is categorized as moderate.
To fix RHSA-2022:6183, you should update the affected packages to the latest version provided by Red Hat.
RHSA-2022:6183 addresses vulnerabilities related to improper sanitization of the Transfer-Encoding header (CVE-2022-1705) and stack exhaustion in Reader.Read (CVE-2022-30631).
Yes, RHSA-2022:6183 includes security fixes that impact Red Hat OpenShift users.
After applying fixes for RHSA-2022:6183, it is recommended to monitor the system for any unusual behavior and ensure all applications function properly.