First published: Tue Nov 23 2021(Updated: )
Red Hat OpenShift Serverless release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8 and 4.9, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.<br>Security Fix(es):<br><li> golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Serverless | =1.19.0 | |
Red Hat OpenShift Container Platform for IBM LinuxONE | >=4.6<4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:4766 is classified as important.
To fix RHSA-2021:4766, you need to update to the latest version of the OpenShift Serverless Operator and ensure your OpenShift Container Platform is within the supported versions.
RHSA-2021:4766 affects Red Hat OpenShift Serverless 1.19.0 and OpenShift Container Platform versions 4.6 to 4.9.
Yes, RHSA-2021:4766 includes security and bug fixes for the OpenShift Serverless Operator.
RHSA-2021:4766 addresses both security vulnerabilities and enhancements in the OpenShift Serverless Operator.