Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2021:2705: Red Hat Security Advisory: Release of OpenShift Serverless 1.16.0

Release of OpenShift Serverless 1.16.0 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.Red Hat OpenShift Serverless 1.16.0 release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6 and 4.7, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section. Security Fix(es):

  • golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)
  • golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
  • golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Related CVEs:
  • CVE-2021-27918: golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader
  • CVE-2021-31525: golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header
  • CVE-2021-33196: golang: archive/zip: malformed archive may cause panic or memory exhaustion
Red Hat Security Data
#vulnerability#red_hat

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update