- Issued:
- 2023-12-07
- Updated:
- 2023-12-07
RHSA-2023:7703 - Important: Red Hat OpenShift Pipelines 1.10.6 release and security update
Synopsis
Important: Red Hat OpenShift Pipelines 1.10.6 release and security update
Type/Severity
Security Advisory Important
Topic
Red Hat OpenShift Pipelines 1.10.6 has been released.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery (CI/CD) solution for building pipelines using Tekton. Tekton is a flexible, Kubernetes-native, open-source CI/CD framework which enables automating deployments across multiple platforms such as Kubernetes, Serverless, and VMs by abstracting away the underlying details.
Security Fix(es):
-
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)
-
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat OpenShift Pipelines consists of:
- Tekton Pipelines 0.44.x
- Tekton Triggers 0.23.x
- ClusterTasks based on Tekton Catalog
- Tekton tkn CLI 0.30.x
- Tekton Operator 0.65.x
- Tekton Chains 0.15.x (GA)
- Tekton Hub 1.12.x (TP)
- Pipelines-as-Code 0.17.x (GA)
For more information, see the Release Notes on any one of the following platforms:
-
Customer Portal: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.13/html/cicd/pipelines#op-release-notes-1-12_op-release-notes
-
OpenShift documentation: https://docs.openshift.com/container-platform/4.13/cicd/pipelines/op-release-notes.html#op-release-notes-1-12_op-release-notes
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Pipelines | 1.10 | x86_64 |
| Red Hat OpenShift Pipelines for IBM Z and LinuxONE | 1.10 | s390x |
| Red Hat OpenShift Pipelines for IBM Power, little endian | 1.10 | ppc64le |
| Red Hat OpenShift Pipelines for ARM | 1.10 | aarch64 |
Fixes
- This content is not included.BZ - 2242803
- This content is not included.BZ - 2243296
- This content is not included.SRVKP-3609
CVEs
- CVE-2007-4559
- CVE-2022-3094
- CVE-2022-48337
- CVE-2022-48339
- CVE-2022-48468
- CVE-2023-2602
- CVE-2023-2603
- CVE-2023-3341
- CVE-2023-3899
- CVE-2023-4016
- CVE-2023-4527
- CVE-2023-4641
- CVE-2023-4806
- CVE-2023-4813
- CVE-2023-4911
- CVE-2023-22745
- CVE-2023-27536
- CVE-2023-28321
- CVE-2023-28484
- CVE-2023-29469
- CVE-2023-29491
- CVE-2023-30630
- CVE-2023-31486
- CVE-2023-32681
- CVE-2023-33460
- CVE-2023-34969
- CVE-2023-38408
- CVE-2023-39325
- CVE-2023-40217
- CVE-2023-44487
References
- https://access.redhat.com/security/updates/classification/#important
- This content is not included.This content is not included.https://access.redhat.com/security/vulnerabilities/RHSB-2023-003
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.