First published: Wed Feb 07 2024(Updated: )
Logging 5.6.16 - Red Hat OpenShift<br>Security Fix(es):<br><li> golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat OpenShift Logging | ||
Red Hat Logging Subsystem for Red Hat OpenShift |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0695 is determined by the impact of the vulnerability, which relates to a Denial of Service (DoS) via Resource Consumption.
To fix RHSA-2024:0695, update to the latest version of the Logging Subsystem for Red Hat OpenShift.
Affected products include the Logging Subsystem for Red Hat OpenShift on various architectures such as IBM Z, IBM Power, and ARM 64.
RHSA-2024:0695 addresses a vulnerability classified as CVE-2023-39326, which allows for Denial of Service via HTTP requests.
Yes, you should be concerned about RHSA-2024:0695 as it can lead to service disruption if the vulnerability is exploited.