First published: Wed Mar 27 2024(Updated: )
Logging for Red Hat OpenShift is an opinionated collector and normalizer of application, infrastructure, and audit logs. It is intended to be used for forwarding logs to various supported systems.<br>Security Fix(es):<br><li> golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat OpenShift Logging | ||
Red Hat Logging Subsystem for Red Hat OpenShift |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1507 is classified as important.
To address RHSA-2024:1507, update the Logging Subsystem for Red Hat OpenShift to the latest version provided in the advisory.
RHSA-2024:1507 affects the Logging Subsystem for Red Hat OpenShift on various architectures including IBM Z, IBM Power, and ARM 64.
RHSA-2024:1507 includes security fixes for vulnerabilities in golang-protobuf related to encoding and JSON handling.
Users of Red Hat OpenShift are recommended to apply the updates outlined in RHSA-2024:1507 as soon as possible.