-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Release of OpenShift Serverless Client kn 1.27.1
Advisory ID:       RHSA-2023:1179-01
Product:           RHOSS
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:1179
Issue date:        2023-03-09
CVE Names:         CVE-2022-41717 
====================================================================
1. Summary:

Release of OpenShift Serverless 1.27.1
The References section contains CVE links providing detailed severity
ratings
for each vulnerability. Ratings are based on a Common Vulnerability Scoring
System (CVSS) base score.

2. Relevant releases/architectures:

Openshift Serverless 1 on RHEL 8Base - ppc64le, s390x, x86_64

3. Description:

Red Hat OpenShift Serverless Client kn 1.27.1 provides a CLI to interact
with Red Hat OpenShift Serverless 1.27.1. The kn CLI is delivered as an RPM
package for installation on RHEL platforms, and as binaries for non-Linux
platforms.

This release includes security and bug fixes, and enhancements.

Security Fixes in this release include:

- - golang: net/http: An attacker can cause excessive memory growth in a Go
server accepting HTTP/2 requests(CVE-2022-41717)

For more details about the security issues, including the impact; a CVSS
score; acknowledgments; and other related information refer to the CVE
pages linked in the References section.

4. Solution:

See the Red Hat OpenShift Container Platform 4.8 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index
See the Red Hat OpenShift Container Platform 4.9 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index
See the Red Hat OpenShift Container Platform 4.10 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index
See the Red Hat OpenShift Container Platform 4.11 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.11/html/serverless/index
See the Red Hat OpenShift Container Platform 4.12 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.12/html/serverless/index

5. Bugs fixed (https://bugzilla.redhat.com/):

2161274 - CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests

6. Package List:

Openshift Serverless 1 on RHEL 8Base:

Source:
openshift-serverless-clients-1.6.1-2.el8.src.rpm

ppc64le:
openshift-serverless-clients-1.6.1-2.el8.ppc64le.rpm

s390x:
openshift-serverless-clients-1.6.1-2.el8.s390x.rpm

x86_64:
openshift-serverless-clients-1.6.1-2.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-41717
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.11/html/serverless/index
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.12/html/serverless/index

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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dtaN
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-1179:01 Moderate: Release of OpenShift Serverless Client

Release of OpenShift Serverless 1.27.1 The References section contains CVE links providing detailed severity ratings for each vulnerability

Summary

Red Hat OpenShift Serverless Client kn 1.27.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.27.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.
This release includes security and bug fixes, and enhancements.
Security Fixes in this release include:
- - golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests(CVE-2022-41717)
For more details about the security issues, including the impact; a CVSS score; acknowledgments; and other related information refer to the CVE pages linked in the References section.



Summary


Solution

See the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index See the Red Hat OpenShift Container Platform 4.9 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index See the Red Hat OpenShift Container Platform 4.10 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index See the Red Hat OpenShift Container Platform 4.11 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.11/html/serverless/index See the Red Hat OpenShift Container Platform 4.12 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.12/html/serverless/index

References

https://access.redhat.com/security/cve/CVE-2022-41717 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index https://access.redhat.com/documentation/en-us/openshift_container_platform/4.11/html/serverless/index https://access.redhat.com/documentation/en-us/openshift_container_platform/4.12/html/serverless/index

Package List

Openshift Serverless 1 on RHEL 8Base:
Source: openshift-serverless-clients-1.6.1-2.el8.src.rpm
ppc64le: openshift-serverless-clients-1.6.1-2.el8.ppc64le.rpm
s390x: openshift-serverless-clients-1.6.1-2.el8.s390x.rpm
x86_64: openshift-serverless-clients-1.6.1-2.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2023:1179-01
Product: RHOSS
Advisory URL: https://access.redhat.com/errata/RHSA-2023:1179
Issued Date: : 2023-03-09
CVE Names: CVE-2022-41717

Topic

Release of OpenShift Serverless 1.27.1The References section contains CVE links providing detailed severityratingsfor each vulnerability. Ratings are based on a Common Vulnerability ScoringSystem (CVSS) base score.


Topic


 

Relevant Releases Architectures

Openshift Serverless 1 on RHEL 8Base - ppc64le, s390x, x86_64


Bugs Fixed

2161274 - CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests


Related News