First published: Thu Feb 03 2022(Updated: )
This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8, and 4.9, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.<br>Security Fix(es):<br><li> golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)</li> <li> golang: Command-line arguments may overwrite global data (CVE-2021-38297)</li> <li> golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Serverless |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:0434 is categorized as important due to security vulnerabilities and bug fixes.
To fix RHSA-2022:0434, update the OpenShift Serverless Operator to the latest version available for your OpenShift version.
RHSA-2022:0434 affects Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8, and 4.9.
RHSA-2022:0434 addresses security vulnerabilities, bug fixes, and performance enhancements in the OpenShift Serverless Operator.
Applying RHSA-2022:0434 may require a maintenance window, so it's advisable to plan for potential downtime during the update.