Advisory Published

RHSA-2022:6042: Important: Release of OpenShift Serverless Client kn 1.24.0

First published: Wed Aug 10 2022(Updated: )

Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.<br>Security Fix(es):<br><li> prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)</li> <li> go-restful: Authorization Bypass Through User-Controlled Key (CVE-2022-1996)</li> <li> golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)</li> <li> golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)</li> <li> golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)</li> <li> golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)</li> <li> golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)</li> <li> golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)</li> <li> golang: net/<a href="http:" target="_blank">http:</a> improper sanitization of Transfer-Encoding header (CVE-2022-1705)</li> <li> golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)</li> <li> golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)</li> <li> golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)</li> <li> golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)</li> <li> golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)</li> <li> golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)</li> For more details about the security issue(s), including the impact; a CVSS<br>score; acknowledgments; and other related information refer to the CVE page(s)<br>listed in the References section.

Affected SoftwareAffected VersionHow to fix
redhat/openshift-serverless-clients<1.3.1-4.el8
1.3.1-4.el8
redhat/openshift-serverless-clients<1.3.1-4.el8
1.3.1-4.el8
redhat/openshift-serverless-clients<1.3.1-4.el8
1.3.1-4.el8

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of RHSA-2022:6042?

    The severity of RHSA-2022:6042 is classified as a security vulnerability that impacts the Red Hat OpenShift Serverless Client.

  • How do I fix RHSA-2022:6042?

    To fix RHSA-2022:6042, upgrade the openshift-serverless-clients package to version 1.3.1-4.el8.

  • What software is affected by RHSA-2022:6042?

    The software affected by RHSA-2022:6042 includes the openshift-serverless-clients package prior to version 1.3.1-4.el8.

  • Is RHSA-2022:6042 related to any specific components?

    Yes, RHSA-2022:6042 is related to vulnerabilities found in the prometheus/client_golang package used in OpenShift.

  • When was RHSA-2022:6042 issued?

    RHSA-2022:6042 was issued to address security vulnerabilities reported for Red Hat OpenShift Serverless Client.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203