First published: Thu May 23 2024(Updated: )
Important: logging for Red Hat OpenShift security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat OpenShift Logging |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:2930 is classified as important.
To fix RHSA-2024:2930, update your Logging Subsystem for Red Hat OpenShift to the latest version provided in the advisory.
RHSA-2024:2930 addresses a denial-of-service vulnerability caused by unlimited CONTINUATION frames in net/http and x/net/http2 (CVE-2023-45288).
The affected products include the Logging Subsystem for Red Hat OpenShift on various architectures including IBM Power, ARM 64, and IBM Z.
There is no specific workaround for RHSA-2024:2930; applying the necessary updates is recommended.