First published: Wed Apr 26 2023(Updated: )
Logging Subsystem 5.6.5 - Red Hat OpenShift<br>Security Fix(es):<br><li> rubygem-rack: denial of service in header parsing (CVE-2023-27539)</li> <li> rubygem-activesupport: Possible XSS in SafeBuffer#bytesplice (CVE-2023-28120)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Origin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:1953 includes vulnerabilities that can lead to denial of service and possible cross-site scripting.
To fix RHSA-2023:1953, update the rubygem-rack and rubygem-activesupport to the patched versions provided by Red Hat.
RHSA-2023:1953 addresses a denial of service vulnerability in rubygem-rack and a potential XSS vulnerability in rubygem-activesupport.
RHSA-2023:1953 affects Red Hat OpenShift versions that utilize the vulnerable rubygem-rack and rubygem-activesupport.
If you are using Red Hat OpenShift and RHSA-2023:1953 affects you, apply the recommended software updates as soon as possible.