-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Custom Metrics Autoscaler Operator for Red Hat OpenShift (with security updates)
Advisory ID:       RHSA-2023:1042-01
Product:           custom-metrics-autoscaler
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:1042
Issue date:        2023-03-06
CVE Names:         CVE-2022-1705 CVE-2022-1962 CVE-2022-2879 
                   CVE-2022-2880 CVE-2022-27664 CVE-2022-28131 
                   CVE-2022-28327 CVE-2022-30630 CVE-2022-30631 
                   CVE-2022-30632 CVE-2022-30633 CVE-2022-30635 
                   CVE-2022-32148 CVE-2022-32149 CVE-2022-41715 
====================================================================
1. Summary:

Custom Metrics Autoscaler Operator for Red Hat OpenShift including security
updates.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

The Custom Metrics Autoscaler Operator for Red Hat OpenShift is an optional
operator, based on the Kubernetes Event Driven Autoscaler (KEDA), that
allows workloads to be scaled using additional metrics sources other than
pod metrics.
This release builds upon updated compiler, runtime library, and base images
for the purpose of resolving any potential security issues present in
previous toolset versions.

This version makes use of newer tools and libraries to address the
following issues:
golang: net/http: improper sanitization of Transfer-Encoding header
(CVE-2022-1705)
golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
golang: archive/tar: unbounded memory consumption when reading headers(CVE-2022-2879)
golang: net/http/httputil: ReverseProxy should not forward unparseable
query parameters (CVE-2022-2880)
golang: net/http: handle server errors after sending GOAWAY
(CVE-2022-27664)
golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For
not working (CVE-2022-32148)
golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time
to parse complex tags (CVE-2022-32149)
golang: regexp/syntax: limit memory used by parsing regexps
(CVE-2022-41715)

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar
2100763 - No space to specify operator.logLevel from Form view when create KedaController
2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read
2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob
2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header
2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions
2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob
2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode
2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip
2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal
2113945 - Icon of Custom Metrics Autoscaler is blurry on operatorhub
2118404 - Wrong GitHub link for Custom Metrics Autoscaler in OperatorHub
2124669 - CVE-2022-27664 golang: net/http: handle server errors after sending GOAWAY
2132867 - CVE-2022-2879 golang: archive/tar: unbounded memory consumption when reading headers2132868 - CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters2132872 - CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps
2134010 - CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags

5. JIRA issues fixed (https://issues.redhat.com/):

OCPNODE-1260 - Wrong links to CMA repository in CMA operator in OperatorHub

6. References:

https://access.redhat.com/security/cve/CVE-2022-1705
https://access.redhat.com/security/cve/CVE-2022-1962
https://access.redhat.com/security/cve/CVE-2022-2879
https://access.redhat.com/security/cve/CVE-2022-2880
https://access.redhat.com/security/cve/CVE-2022-27664
https://access.redhat.com/security/cve/CVE-2022-28131
https://access.redhat.com/security/cve/CVE-2022-28327
https://access.redhat.com/security/cve/CVE-2022-30630
https://access.redhat.com/security/cve/CVE-2022-30631
https://access.redhat.com/security/cve/CVE-2022-30632
https://access.redhat.com/security/cve/CVE-2022-30633
https://access.redhat.com/security/cve/CVE-2022-30635
https://access.redhat.com/security/cve/CVE-2022-32148
https://access.redhat.com/security/cve/CVE-2022-32149
https://access.redhat.com/security/cve/CVE-2022-41715
https://access.redhat.com/security/updates/classification/#moderate

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBZAaFRtzjgjWX9erEAQj/4hAAldx0//Hb5yYz4eiZy9WZCnnao56WgBbQ
DBxiep9b9bhaoOUDDw8g7ClxafMHpp7u7BmQksA9+bnqcBEqNg8OV5mNqglzoPKa
qJkHKI837qX1NUBNwmmj/32cjT0czC0N+QiTM0LoPyWQmiw1pJWriHMfLyFIfcgw
QUDemm7XzYiRYxf+ViHaufndsOGYVplmysdO2C9qGi+Lckzl1fr5GeJgPD4QL/4h
ebpgV2XQb5drYIiBt224HruJNmj2j4iP32hxf3IYOJbihk+EB2ZzkINmDq27a5mf
qrJSJn9Q9ZiMyVP7NqK04HoW/Ntj9ZU0atzHnVVd470TFubgRKOAGsnS68fIC5XP
ZbCPWoGC+mZzzsZrgK+3vMX90Y5rmBXWPHLLooSWCha4TpEhg0rlzmw4dzW+Uumz
M48n+SfIde5b6aCsPAmnNeLNy0UQ9iDcv4Yzmc4qdEfWigRgULaoIHOqJGW0UVZg
ffqcu4S7tihJij5L4j20vbTGWZgn5KAmTY7Dxt/S1yN0Re5uBzMXu0gri5TtKJgM
CEfULzNSXgjE1C8hrPPKKR6La+cyIbAXCocPTlTepwE+mqVtHqAHkvKooOCr45um
BRwrMWahWGgOpZ/COrPu0ccgaz1GRtmArK/pjbXswM8ep2wa6oMaQgf4IA7/1UUF
7NvSWcK9Wr0=F/ST
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-1042:01 Moderate: Custom Metrics Autoscaler Operator for

Custom Metrics Autoscaler Operator for Red Hat OpenShift including security updates

Summary

The Custom Metrics Autoscaler Operator for Red Hat OpenShift is an optional operator, based on the Kubernetes Event Driven Autoscaler (KEDA), that allows workloads to be scaled using additional metrics sources other than pod metrics. This release builds upon updated compiler, runtime library, and base images for the purpose of resolving any potential security issues present in previous toolset versions.
This version makes use of newer tools and libraries to address the following issues: golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) golang: archive/tar: unbounded memory consumption when reading headers(CVE-2022-2879) golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880) golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664) golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327) golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149) golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2022-1705 https://access.redhat.com/security/cve/CVE-2022-1962 https://access.redhat.com/security/cve/CVE-2022-2879 https://access.redhat.com/security/cve/CVE-2022-2880 https://access.redhat.com/security/cve/CVE-2022-27664 https://access.redhat.com/security/cve/CVE-2022-28131 https://access.redhat.com/security/cve/CVE-2022-28327 https://access.redhat.com/security/cve/CVE-2022-30630 https://access.redhat.com/security/cve/CVE-2022-30631 https://access.redhat.com/security/cve/CVE-2022-30632 https://access.redhat.com/security/cve/CVE-2022-30633 https://access.redhat.com/security/cve/CVE-2022-30635 https://access.redhat.com/security/cve/CVE-2022-32148 https://access.redhat.com/security/cve/CVE-2022-32149 https://access.redhat.com/security/cve/CVE-2022-41715 https://access.redhat.com/security/updates/classification/#moderate

Package List


Severity
Advisory ID: RHSA-2023:1042-01
Product: custom-metrics-autoscaler
Advisory URL: https://access.redhat.com/errata/RHSA-2023:1042
Issued Date: : 2023-03-06
CVE Names: CVE-2022-1705 CVE-2022-1962 CVE-2022-2879 CVE-2022-2880 CVE-2022-27664 CVE-2022-28131 CVE-2022-28327 CVE-2022-30630 CVE-2022-30631 CVE-2022-30632 CVE-2022-30633 CVE-2022-30635 CVE-2022-32148 CVE-2022-32149 CVE-2022-41715

Topic

Custom Metrics Autoscaler Operator for Red Hat OpenShift including securityupdates.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar

2100763 - No space to specify operator.logLevel from Form view when create KedaController

2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read

2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob

2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header

2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions

2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working

2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob

2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode

2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip

2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal

2113945 - Icon of Custom Metrics Autoscaler is blurry on operatorhub

2118404 - Wrong GitHub link for Custom Metrics Autoscaler in OperatorHub

2124669 - CVE-2022-27664 golang: net/http: handle server errors after sending GOAWAY

2132867 - CVE-2022-2879 golang: archive/tar: unbounded memory consumption when reading headers2132868 - CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters2132872 - CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps

2134010 - CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags

5. JIRA issues fixed (https://issues.redhat.com/):

OCPNODE-1260 - Wrong links to CMA repository in CMA operator in OperatorHub


Related News