First published: Wed Mar 08 2023(Updated: )
Logging Subsystem 5.6.3 - Red Hat OpenShift<br>Security Fix(es):<br><li> express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999)</li> <li> golang: net/<a href="http:" target="_blank">http:</a> An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:0932 is classified as important due to multiple vulnerabilities affecting the Logging Subsystem.
To fix RHSA-2023:0932, update your Red Hat OpenShift to the latest version that addresses the vulnerabilities.
RHSA-2023:0932 addresses vulnerabilities including CVE-2022-24999, which involves prototype poisoning, and other memory growth issues in Go servers.
RHSA-2023:0932 impacts versions prior to the recommended updates provided in the advisory.
RHSA-2023:0932 is not classified as critical, but it is important to apply the fixes to ensure system stability and security.