- Issued:
- 2024-06-20
- Updated:
- 2024-06-20
RHSA-2024:4023 - Security Advisory
Synopsis
Important: Release of openshift-serverless-clients kn 1.33.0 security update & enhancements
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat openshift-serverless-clients kn 1.33.0 is now available.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Description
Red Hat OpenShift Serverless Client kn 1.33.0 provides a CLI to interact with
Red Hat OpenShift Serverless 1.33.0. The kn CLI is delivered as an RPM package
for installation on RHEL platforms, and as binaries for non-Linux platforms.
This release includes security, bug fixes, and enhancements.
Security Fix(es):
- golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
- golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
- golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)
- golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
- golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)
- golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
A Red Hat Security Bulletin, which addresses further details about the Rapid
Reset flaw is available in the References section.
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
See the Red Hat OpenShift serverless 1 documentation at:
https://access.redhat.com/documentation/en-us/red_hat_openshift_serverless/1
Affected Products
- Red Hat Openshift Serverless 1 x86_64
- Red Hat OpenShift Serverless for IBM Power, little endian 1 ppc64le
- Red Hat OpenShift Serverless for IBM Z and LinuxONE 1 s390x
- Red Hat Openshift Serverless for ARM 1 aarch64
Fixes
- BZ - 2268017 - CVE-2023-45290 golang: net/http: memory exhaustion in Request.ParseMultipartForm
- BZ - 2268018 - CVE-2023-45289 golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect
- BZ - 2268019 - CVE-2024-24783 golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
- BZ - 2268021 - CVE-2024-24784 golang: net/mail: comments in display names are incorrectly handled
- BZ - 2268022 - CVE-2024-24785 golang: html/template: errors returned from MarshalJSON methods may break template escaping
- BZ - 2268273 - CVE-2023-45288 golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
- BZ - 2277862 - Release of Openshift Serverless Client 1.33.0
Red Hat Openshift Serverless 1
SRPM | |
---|---|
openshift-serverless-clients-1.12.0-7.el8.src.rpm | SHA-256: e48bfe9e4e9c41d897a65db52f25a2b7a5a2d5223be5e9f584e9ffb34e41088b |
x86_64 | |
openshift-serverless-clients-1.12.0-7.el8.x86_64.rpm | SHA-256: 7e712ae7293cd39ff65b95fa24774f4531984e4e5cccaa4a2871c4485ecd5dbf |
Red Hat OpenShift Serverless for IBM Power, little endian 1
SRPM | |
---|---|
openshift-serverless-clients-1.12.0-7.el8.src.rpm | SHA-256: e48bfe9e4e9c41d897a65db52f25a2b7a5a2d5223be5e9f584e9ffb34e41088b |
ppc64le | |
openshift-serverless-clients-1.12.0-7.el8.ppc64le.rpm | SHA-256: 591104017e810106bd648a177f5889e79a1e8439bd04842ce383ba912640657e |
Red Hat OpenShift Serverless for IBM Z and LinuxONE 1
SRPM | |
---|---|
openshift-serverless-clients-1.12.0-7.el8.src.rpm | SHA-256: e48bfe9e4e9c41d897a65db52f25a2b7a5a2d5223be5e9f584e9ffb34e41088b |
s390x | |
openshift-serverless-clients-1.12.0-7.el8.s390x.rpm | SHA-256: 67aea500e49e2c8aa5913ba67cfe49ef9f19dbbf4ced9e15198ded6c6dd6e9b2 |
Red Hat Openshift Serverless for ARM 1
SRPM | |
---|---|
openshift-serverless-clients-1.12.0-7.el8.src.rpm | SHA-256: e48bfe9e4e9c41d897a65db52f25a2b7a5a2d5223be5e9f584e9ffb34e41088b |
aarch64 | |
openshift-serverless-clients-1.12.0-7.el8.aarch64.rpm | SHA-256: 0c1d8a1b2851b6427219b6629668b6905c4975d6ccc7708f83efb756e7e85c2d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.