First published: Wed Mar 27 2024(Updated: )
Logging for Red Hat OpenShift is an opinionated collector and normalizer of application, infrastructure, and audit logs. It is intended to be used for forwarding logs to various supported systems.<br>Security Fix(es):<br><li> golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat OpenShift Logging | ||
Red Hat Logging Subsystem for Red Hat OpenShift |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1508 is classified as important.
To fix RHSA-2024:1508, you should update the affected logging subsystem packages to the latest available versions.
RHSA-2024:1508 affects the Logging Subsystem for various architectures of Red Hat OpenShift, including IBM Power, IBM Z, and ARM 64.
RHSA-2024:1508 includes security fixes related to the golang-protobuf encoding/protojson.
Yes, there is a risk of data exposure if the vulnerabilities addressed in RHSA-2024:1508 are not mitigated promptly.