Issued:
2024-06-24
Updated:
2024-06-24

RHSA-2024:4057 - Important: Release of OpenShift Serverless Logic 1.33.0 security update & enhancements


Synopsis

Important: Release of OpenShift Serverless Logic 1.33.0 security update & enhancements

Type/Severity

Security Advisory Important

Topic

Release of OpenShift Serverless Logic 1.33.0

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This release includes security, bug fixes, and enhancements.

Security Fix(es):

  • keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS (CVE-2024-1249)

  • keycloak: XSS via assertion consumer service URL in SAML POST-binding flow (CVE-2023-6717)

  • pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE (CVE-2024-1597)

  • camel-core: Exposure of sensitive data by crafting a malicious EventFactory (CVE-2024-22371)

  • commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file (CVE-2024-25710)

  • commons-compress: OutOfMemoryError unpacking broken Pack200 file (CVE-2024-26308)

  • jose4j: denial of service via specially crafted JWE (CVE-2023-51775)

For more details about the security issues, including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE pages listed in the References section.

Solution

See the Red Hat OpenShift serverless 1.33 documentation at: https://access.redhat.com/documentation/en-us/red_hat_openshift_serverless/1.33

Affected Products

ProductVersionArch
Red Hat Openshift Serverless1x86_64
Red Hat Openshift Serverless for ARM1aarch64
Red Hat OpenShift Serverless for IBM Power, little endian1ppc64le

Fixes

CVEs

References


Additional information