{"id":"RHSA-2022:6042","summary":"Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.24.0","modified":"2026-04-12T10:01:40Z","published":"2024-09-30T14:23:13Z","upstream":["CVE-2022-1705","CVE-2022-1962","CVE-2022-1996","CVE-2022-21698","CVE-2022-24675","CVE-2022-24921","CVE-2022-28131","CVE-2022-28327","CVE-2022-30629","CVE-2022-30630","CVE-2022-30631","CVE-2022-30632","CVE-2022-30633","CVE-2022-30635","CVE-2022-32148"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:6042"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2045880"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2064857"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077688"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077689"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092793"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2094982"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107342"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107374"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107376"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107383"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107386"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107388"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107390"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2107392"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108527"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6042.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1705"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1705"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1705"},{"type":"ARTICLE","url":"https://go.dev/issue/53188"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1962"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1962"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1962"},{"type":"ARTICLE","url":"https://go.dev/issue/53616"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1996"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1996"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1996"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21698"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21698"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21698"},{"type":"ARTICLE","url":"https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24675"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24675"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24675"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/oecdBNLOml8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24921"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24921"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24921"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28131"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28131"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28131"},{"type":"ARTICLE","url":"https://go.dev/issue/53614"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28327"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28327"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28327"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30629"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-30629"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30629"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30630"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-30630"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30630"},{"type":"ARTICLE","url":"https://go.dev/issue/53415"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30631"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-30631"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30631"},{"type":"ARTICLE","url":"https://go.dev/issue/53168"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30632"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-30632"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30632"},{"type":"ARTICLE","url":"https://go.dev/issue/53416"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30633"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-30633"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30633"},{"type":"ARTICLE","url":"https://go.dev/issue/53611"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30635"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-30635"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30635"},{"type":"ARTICLE","url":"https://go.dev/issue/53615"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-32148"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-32148"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32148"},{"type":"ARTICLE","url":"https://go.dev/issue/53423"}],"affected":[{"package":{"name":"openshift-serverless-clients","ecosystem":"Red Hat:serverless:1.0::el8","purl":"pkg:rpm/redhat/openshift-serverless-clients"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.3.1-4.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6042.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}