Moderate: Release of OpenShift Serverless 1.29.0

Synopsis

Moderate: Release of OpenShift Serverless 1.29.0

Type/Severity

Security Advisory: Moderate

Topic

OpenShift Serverless version 1.29.0 contains a moderate security impact.

The References section contains CVE links providing detailed severity ratings
for each vulnerability. Ratings are based on a Common Vulnerability Scoring
System (CVSS) base score.

Description

Version 1.29.0 of the OpenShift Serverless Operator is supported on Red Hat
OpenShift Container Platform versions 4.10, 4.11, 4.12, and 4.13.

This release includes security and bug fixes, and enhancements.

Security Fixes in this release include:

  • containerd: Supplementary groups are not set up properly(CVE-2023-25173)
  • golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding(CVE-2022-41723)
  • golang: net/http, mime/multipart: denial of service from excessive resource consumption(CVE-2022-41725)
  • golang: crypto/tls: large handshake records may cause panics(CVE-2022-41724)
  • golang: html/template: backticks not treated as string delimiters(CVE-2023-24538)
  • golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption(CVE-2023-24536)
  • golang: net/http, net/textproto: denial of service from excessive memory allocation(CVE-2023-24534)
  • golang: go/parser: Infinite loop in parsing(CVE-2023-24537)

For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, see the CVE pages linked from the References section.

Solution

For instructions on how to install and use OpenShift Serverless, see documentation linked from the References section.

Affected Products

  • Red Hat Openshift Serverless 1 x86_64
  • Red Hat OpenShift Serverless for IBM Power, little endian 1 ppc64le
  • Red Hat OpenShift Serverless for IBM Z and LinuxONE 1 s390x

Fixes

  • BZ - 2174485 - CVE-2023-25173 containerd: Supplementary groups are not set up properly
  • BZ - 2178358 - CVE-2022-41723 net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
  • BZ - 2178488 - CVE-2022-41725 golang: net/http, mime/multipart: denial of service from excessive resource consumption
  • BZ - 2178492 - CVE-2022-41724 golang: crypto/tls: large handshake records may cause panics
  • BZ - 2184481 - CVE-2023-24538 golang: html/template: backticks not treated as string delimiters
  • BZ - 2184482 - CVE-2023-24536 golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption
  • BZ - 2184483 - CVE-2023-24534 golang: net/http, net/textproto: denial of service from excessive memory allocation
  • BZ - 2184484 - CVE-2023-24537 golang: go/parser: Infinite loop in parsing
  • BZ - 2185507 - Release of OpenShift Serverless Serving 1.29.0
  • BZ - 2185509 - Release of OpenShift Serverless Eventing 1.29.0