- Issued:
- 2024-06-20
- Updated:
- 2024-06-20
RHSA-2024:4023 - Important: Release of openshift-serverless-clients kn 1.33.0 security update & enhancements
Synopsis
Important: Release of openshift-serverless-clients kn 1.33.0 security update & enhancements
Type/Severity
Security Advisory Important
Topic
Red Hat openshift-serverless-clients kn 1.33.0 is now available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenShift Serverless Client kn 1.33.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.33.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.
This release includes security, bug fixes, and enhancements.
Security Fix(es):
- golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
- golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
- golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)
- golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
- golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)
- golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
A Red Hat Security Bulletin, which addresses further details about the Rapid Reset flaw is available in the References section.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
See the Red Hat OpenShift serverless 1 documentation at: This content is not included.https://access.redhat.com/documentation/en-us/red_hat_openshift_serverless/1
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Openshift Serverless | 1 | x86_64 |
| Red Hat Openshift Serverless for ARM | 1 | aarch64 |
| Red Hat OpenShift Serverless for IBM Z and LinuxONE | 1 | s390x |
| Red Hat OpenShift Serverless for IBM Power, little endian | 1 | ppc64le |
Updated Packages
- openshift-serverless-clients-1.12.0-7.el8.ppc64le.rpm
- openshift-serverless-clients-1.12.0-7.el8.aarch64.rpm
- openshift-serverless-clients-1.12.0-7.el8.s390x.rpm
- openshift-serverless-clients-1.12.0-7.el8.src.rpm
- openshift-serverless-clients-1.12.0-7.el8.x86_64.rpm
Fixes
- This content is not included.BZ - 2268017
- This content is not included.BZ - 2268018
- This content is not included.BZ - 2268019
- This content is not included.BZ - 2268021
- This content is not included.BZ - 2268022
- This content is not included.BZ - 2268273
- This content is not included.BZ - 2277862
CVEs
References
- https://access.redhat.com/security/updates/classification/#important
- This content is not included.This content is not included.https://access.redhat.com/documentation/en-us/red_hat_openshift_serverless/1
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.