First published: Wed Feb 15 2023(Updated: )
Logging Subsystem 5.4.11 - Red Hat OpenShift<br>Security Fix(es):<br><li> rubygem-rack: crafted requests can cause shell escape sequences (CVE-2022-30123)</li> <li> golang: net/<a href="http:" target="_blank">http:</a> An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Origin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:0632 is classified as moderate.
RHSA-2023:0632 addresses vulnerabilities in rubygem-rack that allow crafted requests to cause shell escape sequences and excessive memory growth in the Go server.
To fix RHSA-2023:0632, update the affected packages as recommended in the advisory.
RHSA-2023:0632 affects the Logging Subsystem version 5.4.11 in Red Hat OpenShift.
Yes, RHSA-2023:0632 includes a fix for CVE-2022-30123 related to rubygem-rack vulnerabilities.