First published: Wed Aug 10 2022(Updated: )
Version 1.24.0 of the OpenShift Serverless Operator is supported on Red Hat<br>OpenShift Container Platform versions 4.6, 4.7, 4.8, 4.9, 4.10, and 4.11. <br>This release includes security and bug fixes, and enhancements.<br>Security Fixes in this release include:<br><li> prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)</li> <li> go-restful: Authorization Bypass Through User-Controlled Key (CVE-2022-1996)</li> <li> golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)</li> <li> golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)</li> <li> golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)</li> <li> golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)</li> <li> golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)</li> <li> golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)</li> <li> golang: net/<a href="http:" target="_blank">http:</a> improper sanitization of Transfer-Encoding header (CVE-2022-1705)</li> <li> golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)</li> <li> golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)</li> <li> golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)</li> <li> golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)</li> <li> golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)</li> <li> golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)</li> For more details about the security issues, including the impact; a CVSS score;<br>acknowledgments; and other related information refer to the CVE pages linked in<br>the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.