First published: Thu Jan 14 2021(Updated: )
Red Hat OpenShift Serverless 1.12.0 is a generally available release of the<br>OpenShift Serverless Operator. <br>This version of the OpenShift Serverless<br>Operator is supported on Red Hat OpenShift Container Platform version 4.6, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.<br>Security Fix(es):<br><li> golang: default Content-Type setting in net/http/cgi and net/http/fcgi could cause XSS (CVE-2020-24553)</li> <li> golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)</li> <li> golang: malicious symbol names can lead to code execution at build time (CVE-2020-28366)</li> <li> golang: improper validation of cgo flags can lead to code execution at build time (CVE-2020-28367)</li> For more details about the security issues and their impact, the CVSS<br>score, acknowledgements, and other related information, see the CVE pages<br>listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Serverless | ||
Red Hat OpenShift Container Platform for IBM LinuxONE | >=4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:0146 is primarily categorized based on the specific vulnerabilities it addresses, which have varying impacts.
To fix RHSA-2021:0146, you should update to the latest version of the OpenShift Serverless Operator supported on your platform.
RHSA-2021:0146 affects Red Hat OpenShift Serverless 1.12.0 and is supported on Red Hat OpenShift Container Platform version 4.6.
Yes, RHSA-2021:0146 addresses specific security vulnerabilities that were identified in prior versions.
RHSA-2021:0146 was released as a generally available update for Red Hat OpenShift Serverless 1.12.0.