- Issued:
- 2024-02-20
- Updated:
- 2024-02-20
RHSA-2024:0880 - Security Advisory
Synopsis
Critical: Release of OpenShift Serverless Client kn 1.31.1 security update
Type/Severity
Security Advisory: Critical
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat OpenShift Serverless 1.31.1 is now available.
Red Hat Product Security has rated this update as having a security impact of
Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenShift Serverless Client kn 1.31.1 provides a CLI to interact with
Red Hat OpenShift Serverless 1.31.1. The kn CLI is delivered as an RPM package
for installation on RHEL platforms, and as binaries for non-Linux platforms.
This release includes security, bug fixes, and enhancements.
Security Fix(es):
- go-git: Maliciously crafted Git server replies can cause DoS on go-git clients (CVE-2023-49568)
- go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients (CVE-2023-49569)
- golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)
- ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795)
A Red Hat Security Bulletin, which addresses further details about the Rapid
Reset flaw is available in the References section.
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
See the Red Hat OpenShift serverless documentation at:
https://access.redhat.com/documentation/en-us/red_hat_openshift_serverless/1.31
Affected Products
- Red Hat Openshift Serverless 1 x86_64
- Red Hat OpenShift Serverless for IBM Power, little endian 1 ppc64le
- Red Hat OpenShift Serverless for IBM Z and LinuxONE 1 s390x
Fixes
- BZ - 2253330 - CVE-2023-39326 golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests
- BZ - 2254210 - CVE-2023-48795 ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
- BZ - 2258143 - CVE-2023-49569 go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
- BZ - 2258165 - CVE-2023-49568 go-git: Maliciously crafted Git server replies can cause DoS on go-git clients
Red Hat Openshift Serverless 1
SRPM | |
---|---|
openshift-serverless-clients-1.10.0-6.el8.src.rpm | SHA-256: 657ea7e8b30692a895c01daf524cb471f17752ad79ef125f8339b3ca5e112e3d |
x86_64 | |
openshift-serverless-clients-1.10.0-6.el8.x86_64.rpm | SHA-256: 86565c6befef53159c8e09a031e863df2f65ea48fbc21eae18a901bfe813e2aa |
Red Hat OpenShift Serverless for IBM Power, little endian 1
SRPM | |
---|---|
openshift-serverless-clients-1.10.0-6.el8.src.rpm | SHA-256: 657ea7e8b30692a895c01daf524cb471f17752ad79ef125f8339b3ca5e112e3d |
ppc64le | |
openshift-serverless-clients-1.10.0-6.el8.ppc64le.rpm | SHA-256: 1a0f30d2ee140d663d6f19c3c7d48f8634b04918830f30caa42ba459ca3336e7 |
Red Hat OpenShift Serverless for IBM Z and LinuxONE 1
SRPM | |
---|---|
openshift-serverless-clients-1.10.0-6.el8.src.rpm | SHA-256: 657ea7e8b30692a895c01daf524cb471f17752ad79ef125f8339b3ca5e112e3d |
s390x | |
openshift-serverless-clients-1.10.0-6.el8.s390x.rpm | SHA-256: b8f565dd85e6c2db9747a12899f0f0061b80290f203f5e349375c49eff12dfa0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.