Please see the CVE itself for additional information and how to mitigate/workaround the problem.
However, there are some known documentation issues with what is stated on the vulnerability page. To correct these please see:
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.