- Issued:
- 2022-06-13
- Updated:
- 2022-06-13
RHSA-2022:5004 - Critical: Red Hat OpenShift Service Mesh 2.1.3 security update
Synopsis
Critical: Red Hat OpenShift Service Mesh 2.1.3 security update
Type/Severity
Security Advisory Critical
Topic
Red Hat OpenShift Service Mesh 2.1.3 has been released.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenShift Service Mesh is a Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
This advisory covers the RPM packages for the release.
Security Fix(es):
- envoy: oauth filter allows trivial bypass (CVE-2022-29226)
- envoy: Decompressors can be zip bombed (CVE-2022-29225)
- envoy: oauth filter calls continueDecoding() from within decodeHeaders() (CVE-2022-29228)
- golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)
- golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)
- golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806)
- envoy: Segfault in GrpcHealthCheckerImpl (CVE-2022-29224)
- Istio: Unsafe memory access in metadata exchange (CVE-2022-31045)
For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, see the CVE page listed in the References section.
Solution
The OpenShift Service Mesh Release Notes provide information on the features and known issues. See the link in the References section.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Service Mesh | 2.1 | x86_64 |
| Red Hat OpenShift Service Mesh for Power | 2.1 | ppc64le |
| Red Hat OpenShift Service Mesh for IBM Z | 2.1 | s390x |
Updated Packages
- servicemesh-proxy-debugsource-2.1.3-1.el8.s390x.rpm
- servicemesh-cni-2.1.3-1.el8.s390x.rpm
- servicemesh-prometheus-2.23.0-7.el8.src.rpm
- servicemesh-pilot-discovery-2.1.3-1.el8.ppc64le.rpm
- servicemesh-operator-2.1.3-2.el8.ppc64le.rpm
- servicemesh-2.1.3-1.el8.x86_64.rpm
- servicemesh-proxy-2.1.3-1.el8.x86_64.rpm
- servicemesh-pilot-agent-2.1.3-1.el8.x86_64.rpm
- servicemesh-proxy-debuginfo-2.1.3-1.el8.s390x.rpm
- servicemesh-2.1.3-1.el8.s390x.rpm
- servicemesh-ratelimit-2.1.3-1.el8.s390x.rpm
- servicemesh-cni-2.1.3-1.el8.x86_64.rpm
- servicemesh-proxy-debugsource-2.1.3-1.el8.ppc64le.rpm
- servicemesh-pilot-discovery-2.1.3-1.el8.s390x.rpm
- servicemesh-prometheus-2.23.0-7.el8.s390x.rpm
- servicemesh-operator-2.1.3-2.el8.x86_64.rpm
- servicemesh-pilot-agent-2.1.3-1.el8.ppc64le.rpm
- servicemesh-proxy-2.1.3-1.el8.src.rpm
- servicemesh-proxy-wasm-2.1.3-1.el8.noarch.rpm
- servicemesh-operator-2.1.3-2.el8.s390x.rpm
- servicemesh-proxy-debugsource-2.1.3-1.el8.x86_64.rpm
- servicemesh-prometheus-2.23.0-7.el8.x86_64.rpm
- servicemesh-pilot-discovery-2.1.3-1.el8.x86_64.rpm
- servicemesh-pilot-agent-2.1.3-1.el8.s390x.rpm
- servicemesh-2.1.3-1.el8.ppc64le.rpm
- servicemesh-proxy-2.1.3-1.el8.ppc64le.rpm
- servicemesh-ratelimit-2.1.3-1.el8.x86_64.rpm
- servicemesh-proxy-2.1.3-1.el8.s390x.rpm
- servicemesh-proxy-debuginfo-2.1.3-1.el8.x86_64.rpm
- servicemesh-cni-2.1.3-1.el8.ppc64le.rpm
- servicemesh-operator-2.1.3-2.el8.src.rpm
- servicemesh-ratelimit-2.1.3-1.el8.src.rpm
- servicemesh-2.1.3-1.el8.src.rpm
- servicemesh-proxy-debuginfo-2.1.3-1.el8.ppc64le.rpm
- servicemesh-ratelimit-2.1.3-1.el8.ppc64le.rpm
- servicemesh-prometheus-2.23.0-7.el8.ppc64le.rpm
Fixes
- This content is not included.BZ - 2053429
- This content is not included.BZ - 2053532
- This content is not included.BZ - 2053541
- This content is not included.BZ - 2088737
- This content is not included.BZ - 2088738
- This content is not included.BZ - 2088739
- This content is not included.BZ - 2088740
- This content is not included.BZ - 2088819
- This content is not included.OSSM-1614
- This content is not included.OSSM-1107
CVEs
- CVE-2022-23772
- CVE-2022-23773
- CVE-2022-23806
- CVE-2022-29224
- CVE-2022-29225
- CVE-2022-29226
- CVE-2022-29228
- CVE-2022-31045
References
- https://access.redhat.com/security/updates/classification/#critical
- This page is not included, but the link has been rewritten to point to the nearest parent document.This page is not included, but the link has been rewritten to point to the nearest parent document.https://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.