Issued:
2023-06-05
Updated:
2023-06-05

RHSA-2023:3455 - Moderate: Release of OpenShift Serverless 1.29.0


Synopsis

Moderate: Release of OpenShift Serverless 1.29.0

Type/Severity

Security Advisory Moderate

Topic

OpenShift Serverless version 1.29.0 contains a moderate security impact.

The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.

Description

Version 1.29.0 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.10, 4.11, 4.12, and 4.13.

This release includes security and bug fixes, and enhancements.

Security Fixes in this release include:

  • containerd: Supplementary groups are not set up properly(CVE-2023-25173)
  • golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding(CVE-2022-41723)
  • golang: net/http, mime/multipart: denial of service from excessive resource consumption(CVE-2022-41725)
  • golang: crypto/tls: large handshake records may cause panics(CVE-2022-41724)
  • golang: html/template: backticks not treated as string delimiters(CVE-2023-24538)
  • golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption(CVE-2023-24536)
  • golang: net/http, net/textproto: denial of service from excessive memory allocation(CVE-2023-24534)
  • golang: go/parser: Infinite loop in parsing(CVE-2023-24537)

For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, see the CVE pages linked from the References section.

Solution

For instructions on how to install and use OpenShift Serverless, see documentation linked from the References section.

Affected Products

ProductVersionArch
Red Hat Openshift Serverless1x86_64
Red Hat OpenShift Serverless for IBM Z and LinuxONE1s390x
Red Hat OpenShift Serverless for IBM Power, little endian1ppc64le

Fixes

CVEs

References


Additional information