First published: Tue Dec 13 2022(Updated: )
Version 1.26.0 of the OpenShift Serverless Operator is supported on Red Hat<br>OpenShift Container Platform versions 4.8, 4.9, 4.10, and 4.11. <br>This release includes security and bug fixes, and enhancements.<br><li> golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)</li> <li> golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)</li> For more details about the security issues, including the impact; a CVSS score;<br>acknowledgments; and other related information refer to the CVE pages linked in<br>the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Container Platform for IBM LinuxONE | >=4.8<4.12 | |
Red Hat OpenShift Serverless Operator |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:8938 is categorized as moderate due to security issues addressed in the OpenShift Serverless Operator.
To fix RHSA-2022:8938, upgrade to version 1.26.0 of the OpenShift Serverless Operator on the supported Red Hat OpenShift Container Platform versions.
RHSA-2022:8938 addresses security vulnerabilities including CVE-2022-27191 related to a crash in a golang.org/x/crypto/ssh server.
RHSA-2022:8938 affects Red Hat OpenShift Container Platform versions 4.8, 4.9, 4.10, and 4.11.
Yes, immediate action is recommended for RHSA-2022:8938 to mitigate potential security risks.