- Issued:
- 2022-08-10
- Updated:
- 2022-08-10
RHSA-2022:6042 - Security Advisory
Synopsis
Important: Release of OpenShift Serverless Client kn 1.24.0
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Release of OpenShift Serverless Client kn 1.24.0
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Description
Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.
Security Fix(es):
- prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
- go-restful: Authorization Bypass Through User-Controlled Key (CVE-2022-1996)
- golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
- golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
- golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
- golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
- golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
- golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
- golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
- golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
- golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
- golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)
- golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
- golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
- golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
For more details about the security issue(s), including the impact; a CVSS
score; acknowledgments; and other related information refer to the CVE page(s)
listed in the References section.
Solution
See the Red Hat OpenShift Container Platform 4.6 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index See the Red Hat OpenShift Container Platform 4.7 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index See the Red Hat OpenShift Container Platform 4.8 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index See the Red Hat OpenShift Container Platform 4.9 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index See the Red Hat OpenShift Container Platform 4.10 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index
Affected Products
- Red Hat Openshift Serverless 1 x86_64
- Red Hat OpenShift Serverless for IBM Power, little endian 1 ppc64le
- Red Hat OpenShift Serverless for IBM Z and LinuxONE 1 s390x
Fixes
- BZ - 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter
- BZ - 2064857 - CVE-2022-24921 golang: regexp: stack exhaustion via a deeply nested expression
- BZ - 2077688 - CVE-2022-24675 golang: encoding/pem: fix stack overflow in Decode
- BZ - 2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar
- BZ - 2092793 - CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add
- BZ - 2094982 - CVE-2022-1996 go-restful: Authorization Bypass Through User-Controlled Key
- BZ - 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read
- BZ - 2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob
- BZ - 2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header
- BZ - 2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions
- BZ - 2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
- BZ - 2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob
- BZ - 2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode
- BZ - 2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip
- BZ - 2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal
- BZ - 2108527 - Release of Openshift Serverless Client 1.24.0
CVEs
References
- https://access.redhat.com/security/updates/classification/#important
- https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index
- https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index
- https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index
- https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index
- https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index
Red Hat Openshift Serverless 1
SRPM | |
---|---|
openshift-serverless-clients-1.3.1-4.el8.src.rpm | SHA-256: 0a36d943c67f47dfcabd57f5e0f5e2496b0d38d5eac9e6d9d2bde4c65f6f76c3 |
x86_64 | |
openshift-serverless-clients-1.3.1-4.el8.x86_64.rpm | SHA-256: b1e5bd62cc2a88d29b2e554a734453634c996f57d2100b43f0c74fcd1d9a0b81 |
Red Hat OpenShift Serverless for IBM Power, little endian 1
SRPM | |
---|---|
openshift-serverless-clients-1.3.1-4.el8.src.rpm | SHA-256: 0a36d943c67f47dfcabd57f5e0f5e2496b0d38d5eac9e6d9d2bde4c65f6f76c3 |
ppc64le | |
openshift-serverless-clients-1.3.1-4.el8.ppc64le.rpm | SHA-256: 4b7c1000420bf89aa6ab9fa005c90f8a071c2e9620a507694c7ff8cb98b39d2c |
Red Hat OpenShift Serverless for IBM Z and LinuxONE 1
SRPM | |
---|---|
openshift-serverless-clients-1.3.1-4.el8.src.rpm | SHA-256: 0a36d943c67f47dfcabd57f5e0f5e2496b0d38d5eac9e6d9d2bde4c65f6f76c3 |
s390x | |
openshift-serverless-clients-1.3.1-4.el8.s390x.rpm | SHA-256: e05937cecf94c723281a41096f7c9de9a4e7ab049d3e13beb6b2af9a0078a4ca |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.