First published: Wed Feb 07 2024(Updated: )
Logging Subsystem 5.7.11 - Red Hat OpenShift<br>Security Fix(es):<br><li> golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat OpenShift Logging | ||
Red Hat Logging Subsystem for Red Hat OpenShift |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0694 relates to a Denial of Service (DoS) vulnerability, which can impact the availability of the affected systems.
To fix RHSA-2024:0694, users should apply the latest security updates provided by Red Hat for the Logging Subsystem for OpenShift.
RHSA-2024:0694 affects the Logging Subsystem for Red Hat OpenShift across various architectures including IBM Z, IBM Power, and ARM 64.
CVE-2023-39326 is the specific vulnerability identified that allows for Denial of Service through resource consumption via HTTP requests.
There are no specific workarounds for RHSA-2024:0694; updating the affected software is the recommended action.