First published: Wed Mar 08 2023(Updated: )
Logging Subsystem 5.5.8 - Red Hat OpenShift<br>Security Fix(es):<br><li> express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999)</li> <li> golang: net/<a href="http:" target="_blank">http:</a> An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:0930 includes a significant security concern due to multiple vulnerabilities in the Logging Subsystem.
To fix RHSA-2023:0930, apply the latest security updates provided by Red Hat for the affected software.
RHSA-2023:0930 addresses vulnerabilities such as express 'qs' prototype poisoning and excessive memory growth in Go server.
RHSA-2023:0930 was released in 2023 to address specific vulnerabilities in the Logging Subsystem.
Organizations using Red Hat OpenShift and the associated Logging Subsystem should be concerned about RHSA-2023:0930.