First published: Tue Sep 06 2022(Updated: )
Logging Subsystem 5.5.1 - Red Hat OpenShift<br>Security Fix(es):<br><li> golang: net/<a href="http:" target="_blank">http:</a> improper sanitization of Transfer-Encoding header (CVE-2022-1705)</li> <li> golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)</li> <li> golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Container Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2022:6344 has been classified as a moderate severity security fix affecting Red Hat OpenShift.
To fix RHSA-2022:6344, you should update your OpenShift to the latest version that includes the security patches.
RHSA-2022:6344 addresses vulnerabilities CVE-2022-1705 and CVE-2022-30631 related to improper sanitization and stack exhaustion.
Yes, RHSA-2022:6344 includes fixes for vulnerabilities found in Golang components.
RHSA-2022:6344 affects the Logging Subsystem version 5.5.1 in Red Hat OpenShift.