First published: Thu Feb 09 2023(Updated: )
Version 1.27.0 of the OpenShift Serverless Operator is supported on Red Hat<br>OpenShift Container Platform versions 4.8, 4.9, 4.10, 4.11 and 4.12. <br>This release includes security and bug fixes, and enhancements.<br><li> golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)</li> <li> golang: net/<a href="http:" target="_blank">http:</a> handle server errors after sending GOAWAY (CVE-2022-27664)</li> <li> golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)</li> <li> golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)</li> For more details about the security issues, including the impact; a CVSS score;<br>acknowledgments; and other related information refer to the CVE pages linked in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Serverless Operator | ||
Red Hat OpenShift Container Platform for IBM LinuxONE | >=4.8<=4.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:0709 relates to security and bug fixes in the OpenShift Serverless Operator.
To fix RHSA-2023:0709, you should update to version 1.27.0 of the OpenShift Serverless Operator.
RHSA-2023:0709 affects Red Hat OpenShift Container Platform versions 4.8, 4.9, 4.10, 4.11, and 4.12.
RHSA-2023:0709 includes enhancements and improvements alongside the security fixes.
Yes, version 1.27.0 of the OpenShift Serverless Operator is supported on the specified OpenShift Container Platform versions.