First published: Wed Mar 08 2023(Updated: )
Logging Subsystem 5.4.12 - Red Hat OpenShift<br>Security Fix(es):<br><li> golang: net/<a href="http:" target="_blank">http:</a> An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Origin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:0931 is classified as moderate.
RHSA-2023:0931 addresses a vulnerability in the Go server related to excessive memory growth when accepting HTTP/2 requests, identified as CVE-2022-41717.
To fix RHSA-2023:0931, it's recommended to update to the latest version of Red Hat OpenShift that contains the security patch.
RHSA-2023:0931 affects certain versions of Red Hat OpenShift, mainly those that include the vulnerable Logging Subsystem 5.4.12.
Yes, due to the potential for excessive memory growth in affected systems, it's important to apply the recommended updates promptly.