First published: Thu Feb 08 2024(Updated: )
Logging Subsystem 5.8.3 - Red Hat OpenShift<br>Security Fix(es):<br><li> golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat OpenShift Logging |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0728 is critical due to its potential for Denial of Service (DoS) via resource consumption.
To fix RHSA-2024:0728, apply the latest security updates for the affected versions of the Logging Subsystem for Red Hat OpenShift.
RHSA-2024:0728 affects the Logging Subsystem for Red Hat OpenShift across multiple architectures including IBM Power, ARM 64, and IBM Z.
CVE-2023-39326 is the specific vulnerability that allows for Denial of Service via resource consumption within the net/http/internal package.
If you are using any version of the Logging Subsystem for Red Hat OpenShift, then RHSA-2024:0728 is relevant and you should take action.