First published: Thu May 23 2024(Updated: )
An update is now available for RHOL-5.9-RHEL-9.<br>Security Fix(es):<br><li> golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat Logging Subsystem for Red Hat OpenShift | ||
Red Hat OpenShift Logging |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:2933 is determined by the CVSS score associated with the vulnerabilities it addresses, specifically CVE-2023-45288.
To fix RHSA-2024:2933, apply the security update provided by Red Hat for the affected software versions.
RHSA-2024:2933 affects the Logging Subsystem for Red Hat OpenShift on various architectures including IBM Z, LinuxONE, IBM Power, and ARM 64.
RHSA-2024:2933 addresses a denial-of-service vulnerability caused by an unlimited number of CONTINUATION frames in the net/http and x/net/http2 packages.
RHSA-2024:2933 was released as an update for RHOL-5.9-RHEL-9.