First published: Wed Jan 17 2024(Updated: )
Logging Subsystem 5.8.2 - Red Hat OpenShift<br>Security Fix(es):<br><li> CVE-2023-26159 follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat OpenShift Logging |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0271 is classified based on the CVSS score associated with CVE-2023-26159.
To fix RHSA-2024:0271, apply the latest updates provided by Red Hat for the affected Logging Subsystem versions.
The affected products include Logging Subsystem for Red Hat OpenShift on various architectures including IBM Power, ARM 64, and IBM Z and LinuxONE.
CVE-2023-26159 refers to an improper input validation vulnerability that affects the URL handling of the logging subsystem.
Yes, it is recommended to address RHSA-2024:0271 promptly to mitigate the risk associated with the identified vulnerability.