First published: Thu Jul 25 2024(Updated: )
Version 1.33.1 of the OpenShift Serverless Operator is supported on Red Hat<br>OpenShift Container Platform versions 4.12, 4.13, 4.14, 4.15 and 4.16<br>This release includes security, bug fixes, and enhancements.<br>Security Fix(es):<br><li> golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789)</li> <li> golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (CVE-2024-24790)</li> <li> go-retryable<a href="http:" target="_blank">http:</a> url might write sensitive information to log file (CVE-2024-6104)</li> <li> golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)</li> For more details about the security issues, including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE pages listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Serverless Operator | ||
Red Hat OpenShift Container Platform for IBM LinuxONE | >=4.12<=4.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:4872 addresses security vulnerabilities related to incorrect handling in golang's archive/zip package.
RHSA-2024:4872 impacts OpenShift Serverless Operator version 1.33.1.
The fix in RHSA-2024:4872 supports OpenShift Container Platform versions 4.12 through 4.16.
You can update your OpenShift Serverless Operator to version 1.33.1 to comply with RHSA-2024:4872.
Yes, applying RHSA-2024:4872 is critical as it addresses security vulnerabilities that could affect the integrity of your system.