First published: Wed Mar 27 2024(Updated: )
Logging for Red Hat OpenShift is an opinionated collector and normalizer of application, infrastructure, and audit logs. It is intended to be used for forwarding logs to various supported systems.<br>Security Fix(es):<br><li> golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)</li> <li> follow-redirects: Possible credential leak (CVE-2024-28849)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat OpenShift Logging |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1474 is classified as important.
To fix RHSA-2024:1474, update the affected Red Hat OpenShift Logging Subsystem to the latest available version.
Affected products include the Logging Subsystem for Red Hat OpenShift on various architectures such as IBM Power, ARM 64, and IBM Z.
RHSA-2024:1474 impacts application, infrastructure, and audit logs collected by the Red Hat OpenShift Logging Subsystem.
Yes, users must take action by applying the relevant updates to mitigate the vulnerabilities associated with RHSA-2024:1474.