First published: Tue Jul 13 2021(Updated: )
Red Hat OpenShift Serverless 1.16.0 release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6 and 4.7, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.<br>Security Fix(es):<br><li> golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)</li> <li> golang: net/<a href="http:" target="_blank">http:</a> panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)</li> <li> golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Serverless | ||
Red Hat OpenShift Container Platform for IBM LinuxONE | >=4.6<=4.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:2705 is classified as important due to security vulnerabilities that require attention.
To fix RHSA-2021:2705, update to the latest version of OpenShift Serverless Operator as recommended in the security advisory.
RHSA-2021:2705 affects Red Hat OpenShift Container Platform versions 4.6 and 4.7.
RHSA-2021:2705 includes security fixes, bug fixes, and enhancements for the OpenShift Serverless Operator.
Additional information about RHSA-2021:2705 can be found in the Red Hat security advisory.