-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Release of OpenShift Serverless 1.29.1 Advisory ID: RHSA-2023:4472-01 Product: Red Hat OpenShift Serverless Advisory URL: https://access.redhat.com/errata/RHSA-2023:4472 Issue date: 2023-08-03 CVE Names: CVE-2020-24736 CVE-2022-36227 CVE-2023-1667 CVE-2023-2283 CVE-2023-3089 CVE-2023-22006 CVE-2023-22036 CVE-2023-22041 CVE-2023-22044 CVE-2023-22045 CVE-2023-22049 CVE-2023-24329 CVE-2023-24539 CVE-2023-25193 CVE-2023-26604 CVE-2023-27535 CVE-2023-29400 ===================================================================== 1. Summary: Red Hat OpenShift Serverless version 1.29.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Version 1.29.1 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.10, 4.11, 4.12, and 4.13. This release includes security and bug fixes, and enhancements. Security Fix(es): * openshift: OCP & FIPS mode (CVE-2023-3089) * golang: html/template: improper sanitization of CSS values (CVE-2023-24539) * golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400) For more information about CVE-2023-3089, see https://access.redhat.com/security/vulnerabilities/RHSB-2023-001. For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2196026 - CVE-2023-24539 golang: html/template: improper sanitization of CSS values 2196029 - CVE-2023-29400 golang: html/template: improper handling of empty HTML attributes 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode 5. References: https://access.redhat.com/security/cve/CVE-2020-24736 https://access.redhat.com/security/cve/CVE-2022-36227 https://access.redhat.com/security/cve/CVE-2023-1667 https://access.redhat.com/security/cve/CVE-2023-2283 https://access.redhat.com/security/cve/CVE-2023-3089 https://access.redhat.com/security/cve/CVE-2023-22006 https://access.redhat.com/security/cve/CVE-2023-22036 https://access.redhat.com/security/cve/CVE-2023-22041 https://access.redhat.com/security/cve/CVE-2023-22044 https://access.redhat.com/security/cve/CVE-2023-22045 https://access.redhat.com/security/cve/CVE-2023-22049 https://access.redhat.com/security/cve/CVE-2023-24329 https://access.redhat.com/security/cve/CVE-2023-24539 https://access.redhat.com/security/cve/CVE-2023-25193 https://access.redhat.com/security/cve/CVE-2023-26604 https://access.redhat.com/security/cve/CVE-2023-27535 https://access.redhat.com/security/cve/CVE-2023-29400 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/vulnerabilities/RHSB-2023-001 https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index https://access.redhat.com/documentation/en-us/openshift_container_platform/4.11/html/serverless/index https://access.redhat.com/documentation/en-us/openshift_container_platform/4.12/html/serverless/index https://access.redhat.com/documentation/en-us/openshift_container_platform/4.13/html/serverless/index 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJkzAwUAAoJENzjgjWX9erES/UP/307ho5Lr+RAZQDG0xGUS4Qf 2j+ZVHxV1ikAGgwBQTFmpHxRj8wvkdzwp6AcWfu8oAnTXtXi55tBmcogoZRAf90r f06I0L1hJvHQqQ6mL2u7ToaPMw2erF3+XwLVn8tn88E/yGmSfZfcvFSHE8Q4izXS 0je1Hs1SUyLzCnXux60pyfFqhufK3td8ToqkYpp2lno+GSBHtbfbrlZqRBSJMOww yl63v1IAu6oGfT7/Z8Tyy1kEB8fmK33IHuW3l+iiqumvQGgMxPAM/BGMIOjnv1Zz h+maprr9+juQ4Z/IapkAUfHE0rWQ/gtXTe7L6ViQmFpRNaq1XAg+hD8HLs5fQZUj KN5uCHhvorDEro1/CrsyRug60d9WXgljDjguylmybqRPow1VNKMqsFu6UFyuLK3N /Qqf7JOybuOO4TRO28ugTpyydmy7JCj+UBwxvGqivkSiqx3wdlA+t+C7yc9o1Zxq GaiCtg0SCz5yDXpcmU12qHXpzjevjKmqwoULpK1tqR+B3Vg76BtFxb4UbFbria4f 9zGbkPbYyIVSJXE5nEWMXlkANuiG5X4jn6Jy16d6U6485MAppICv7VgvEmI7O93L O5Q1SgtKFo5jSYV9nKga/EAiJuh+YK9XGaQnia7k7of2R/vWuG8SJ7cn+MyBKMvQ nNu7xh1i1gcNXRN0afB6 =lZHO -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce