First published: Thu Mar 24 2022(Updated: )
This version of the OpenShift Serverless Operator is supported on Red Hat<br>OpenShift Container Platform versions 4.6, 4.7, 4.8, 4.9, and 4.10, includes<br>security and bug fixes and enhancements. For more information, see the<br>documentation listed in the References section.<br>Security Fix(es):<br><li> golang: syscall: don't close fd 0 on ForkExec error (CVE-2021-44717)</li> <li> golang: net/<a href="http:" target="_blank">http:</a> limit growth of header canonicalization cache</li> (CVE-2021-44716)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Serverless |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:1051 is categorized as important.
To fix RHSA-2022:1051, update your OpenShift Serverless Operator to the latest version provided for your platform.
RHSA-2022:1051 affects OpenShift Container Platform versions 4.6, 4.7, 4.8, 4.9, and 4.10.
There are no specified workarounds for RHSA-2022:1051; the recommended action is to apply the update.
RHSA-2022:1051 includes security and bug fixes along with various enhancements to the OpenShift Serverless Operator.