-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Low: Release of OpenShift Serverless Client kn 1.21.1
Advisory ID:       RHSA-2022:1291-01
Product:           Red Hat OpenShift Serverless
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:1291
Issue date:        2022-04-11
CVE Names:         CVE-2022-22963 
====================================================================
1. Summary:

Release of OpenShift Serverless Client kn 1.21.1

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Openshift Serverless 1 on RHEL 8Base - ppc64le, s390x, x86_64

3. Description:

Red Hat OpenShift Serverless Client kn 1.21.1 provides a CLI to interact
with Red Hat OpenShift Serverless 1.21.1. The kn CLI is delivered as an RPM
package for installation on RHEL platforms, and as binaries for non-Linux
platforms.

Security Fix(es):

* spring-cloud-function: Remote code execution by malicious Spring
Expression (CVE-2022-22963)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

See the Red Hat OpenShift Container Platform 4.6 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index
See the Red Hat OpenShift Container Platform 4.7 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index
See the Red Hat OpenShift Container Platform 4.8 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index
See the Red Hat OpenShift Container Platform 4.9 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index
See the Red Hat OpenShift Container Platform 4.10 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index

5. Bugs fixed (https://bugzilla.redhat.com/):

2070668 - CVE-2022-22963 spring-cloud-function: Remote code execution by malicious Spring Expression

6. Package List:

Openshift Serverless 1 on RHEL 8Base:

Source:
openshift-serverless-clients-1.0.1-2.el8.src.rpm

ppc64le:
openshift-serverless-clients-1.0.1-2.el8.ppc64le.rpm

s390x:
openshift-serverless-clients-1.0.1-2.el8.s390x.rpm

x86_64:
openshift-serverless-clients-1.0.1-2.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-22963
https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/security/vulnerabilities/RHSB-2022-003
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYlP/ydzjgjWX9erEAQgEIBAAhc5PWyJN5kNJ58A5aQBCNH6/Ky3bAWsE
a7q98SkTCLfDieTsvDfNyM3M9cHDZqf0h8cnc5bm2LMjIcJJOuemF5CN3k5lWh60
SZRBKOlhSznYL27T3ASFMIpdM3J3X+O+FC39/KfmrG/xXsX+0ikkJkullhAPX9sH
/VYhg73YF4gKoH5pIJzm6VHR8GhP50rRngu7XEHM0SRjdIbfZ95dsAXcwAhP35ML
JgJ7C/Plo+BW3E9YGHwZZUs8wKFz7lbIjsbxO7P9vUCwYlN1+DTAX/VBmFr2KE2a
nkOzAFEMJp7MQr8tsSJDUUOzzCxrsj+2YLhXe+afhkyWWSR8jWhTr1ogMPyVrkMD
pD/gEuGSpj6eDsbfzSbSvHymGt0XoZyMYprflDRlObjMWU8K4skbKHxJrg/KaMmP
+XczMUmkRTlzIcMex8VY4IN1AT/wznBeAzEfY6LQ6VQilXtwvOzq1ENiRemA2Nw8
hbIuqEAakfKqSZuYsdQv+/Llu9FNCjEjjCoQMI+qXw9renlX7GwO0YA8oYbG69nj
d91QQNlL4r9mPCo5UN2ygzB1MFUeDJaeLONnYckig+NE+Uasz0qldk8tTcS+Ivh3
HMUD9xhonSnsgLD63hKt66lu9dhgEluaGpsJAUNshFgnRCcjsLvpBsRh3V1rWEyx
y562M792O+c=/S+P
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-1291:01 Low: Release of OpenShift Serverless Client kn

Release of OpenShift Serverless Client kn 1.21.1 Red Hat Product Security has rated this update as having a security impact of Low

Summary

Red Hat OpenShift Serverless Client kn 1.21.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.21.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.
Security Fix(es):
* spring-cloud-function: Remote code execution by malicious Spring Expression (CVE-2022-22963)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index See the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index See the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index See the Red Hat OpenShift Container Platform 4.9 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index See the Red Hat OpenShift Container Platform 4.10 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index

References

https://access.redhat.com/security/cve/CVE-2022-22963 https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/security/vulnerabilities/RHSB-2022-003 https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index

Package List

Openshift Serverless 1 on RHEL 8Base:
Source: openshift-serverless-clients-1.0.1-2.el8.src.rpm
ppc64le: openshift-serverless-clients-1.0.1-2.el8.ppc64le.rpm
s390x: openshift-serverless-clients-1.0.1-2.el8.s390x.rpm
x86_64: openshift-serverless-clients-1.0.1-2.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2022:1291-01
Product: Red Hat OpenShift Serverless
Advisory URL: https://access.redhat.com/errata/RHSA-2022:1291
Issued Date: : 2022-04-11
CVE Names: CVE-2022-22963

Topic

Release of OpenShift Serverless Client kn 1.21.1Red Hat Product Security has rated this update as having a security impactof Low. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Openshift Serverless 1 on RHEL 8Base - ppc64le, s390x, x86_64


Bugs Fixed

2070668 - CVE-2022-22963 spring-cloud-function: Remote code execution by malicious Spring Expression


Related News