Issued:
2022-06-13
Updated:
2022-06-13

RHSA-2022:5004 - Critical: Red Hat OpenShift Service Mesh 2.1.3 security update


Synopsis

Critical: Red Hat OpenShift Service Mesh 2.1.3 security update

Type/Severity

Security Advisory Critical

Topic

Red Hat OpenShift Service Mesh 2.1.3 has been released.

Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Service Mesh is a Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.

This advisory covers the RPM packages for the release.

Security Fix(es):

  • envoy: oauth filter allows trivial bypass (CVE-2022-29226)
  • envoy: Decompressors can be zip bombed (CVE-2022-29225)
  • envoy: oauth filter calls continueDecoding() from within decodeHeaders() (CVE-2022-29228)
  • golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)
  • golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)
  • golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806)
  • envoy: Segfault in GrpcHealthCheckerImpl (CVE-2022-29224)
  • Istio: Unsafe memory access in metadata exchange (CVE-2022-31045)

For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, see the CVE page listed in the References section.

Solution

The OpenShift Service Mesh Release Notes provide information on the features and known issues. See the link in the References section.

Affected Products

ProductVersionArch
Red Hat OpenShift Service Mesh2.1x86_64
Red Hat OpenShift Service Mesh for Power2.1ppc64le
Red Hat OpenShift Service Mesh for IBM Z2.1s390x

Updated Packages

  • servicemesh-proxy-debugsource-2.1.3-1.el8.s390x.rpm
  • servicemesh-cni-2.1.3-1.el8.s390x.rpm
  • servicemesh-prometheus-2.23.0-7.el8.src.rpm
  • servicemesh-pilot-discovery-2.1.3-1.el8.ppc64le.rpm
  • servicemesh-operator-2.1.3-2.el8.ppc64le.rpm
  • servicemesh-2.1.3-1.el8.x86_64.rpm
  • servicemesh-proxy-2.1.3-1.el8.x86_64.rpm
  • servicemesh-pilot-agent-2.1.3-1.el8.x86_64.rpm
  • servicemesh-proxy-debuginfo-2.1.3-1.el8.s390x.rpm
  • servicemesh-2.1.3-1.el8.s390x.rpm
  • servicemesh-ratelimit-2.1.3-1.el8.s390x.rpm
  • servicemesh-cni-2.1.3-1.el8.x86_64.rpm
  • servicemesh-proxy-debugsource-2.1.3-1.el8.ppc64le.rpm
  • servicemesh-pilot-discovery-2.1.3-1.el8.s390x.rpm
  • servicemesh-prometheus-2.23.0-7.el8.s390x.rpm
  • servicemesh-operator-2.1.3-2.el8.x86_64.rpm
  • servicemesh-pilot-agent-2.1.3-1.el8.ppc64le.rpm
  • servicemesh-proxy-2.1.3-1.el8.src.rpm
  • servicemesh-proxy-wasm-2.1.3-1.el8.noarch.rpm
  • servicemesh-operator-2.1.3-2.el8.s390x.rpm
  • servicemesh-proxy-debugsource-2.1.3-1.el8.x86_64.rpm
  • servicemesh-prometheus-2.23.0-7.el8.x86_64.rpm
  • servicemesh-pilot-discovery-2.1.3-1.el8.x86_64.rpm
  • servicemesh-pilot-agent-2.1.3-1.el8.s390x.rpm
  • servicemesh-2.1.3-1.el8.ppc64le.rpm
  • servicemesh-proxy-2.1.3-1.el8.ppc64le.rpm
  • servicemesh-ratelimit-2.1.3-1.el8.x86_64.rpm
  • servicemesh-proxy-2.1.3-1.el8.s390x.rpm
  • servicemesh-proxy-debuginfo-2.1.3-1.el8.x86_64.rpm
  • servicemesh-cni-2.1.3-1.el8.ppc64le.rpm
  • servicemesh-operator-2.1.3-2.el8.src.rpm
  • servicemesh-ratelimit-2.1.3-1.el8.src.rpm
  • servicemesh-2.1.3-1.el8.src.rpm
  • servicemesh-proxy-debuginfo-2.1.3-1.el8.ppc64le.rpm
  • servicemesh-ratelimit-2.1.3-1.el8.ppc64le.rpm
  • servicemesh-prometheus-2.23.0-7.el8.ppc64le.rpm

Fixes

CVEs

References


Additional information