First published: Wed Jun 01 2022(Updated: )
Version 1.22.1 of the OpenShift Serverless Operator is supported on Red Hat<br>OpenShift Container Platform versions 4.6, 4.7, 4.8, 4.9, and 4.10. <br>This release includes security and bug fixes, and enhancements.<br>Security Fixes in this release include:<br><li> golang: crypto/elliptic IsOnCurve returns true for invalid field elements(CVE-2022-23806)</li> <li> golang: cmd/go: misinterpretation of branch names can lead to incorrect access control(CVE-2022-23773)</li> <li> golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)</li> For more details about the security issues, including the impact; a CVSS score; acknowledgments; and other related information refer to the CVE pages linked in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Container Platform for IBM LinuxONE | >=4.6<4.11 | |
Red Hat OpenShift Serverless Operator |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity is determined by the security vulnerabilities addressed in the release, which includes important security fixes.
To fix RHSA-2022:4863, you should update your OpenShift Serverless Operator to version 1.22.1.
RHSA-2022:4863 affects Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8, 4.9, and 4.10.
RHSA-2022:4863 includes various bug fixes and performance enhancements alongside security improvements.
RHSA-2022:4863 contains security fixes that are significant, but the criticality depends on your specific deployment and risk assessment.