- Issued:
- 2022-08-31
- Updated:
- 2022-08-31
RHSA-2022:6277 - Moderate: Red Hat OpenShift Service Mesh 2.1.5 security update
Synopsis
Moderate: Red Hat OpenShift Service Mesh 2.1.5 security update
Type/Severity
Security Advisory Moderate
Topic
Red Hat OpenShift Service Mesh 2.1.5
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation.
This advisory covers the RPM packages for the release.
Security Fix(es):
- moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)
- golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
- moment: Moment.js: Path traversal in moment.locale (CVE-2022-24785)
- golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)
- golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
- golang: syscall: faccessat checks wrong group (CVE-2022-29526)
- golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
The OpenShift Service Mesh Release Notes provide information on the features and known issues:
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Service Mesh | 2.1 | x86_64 |
| Red Hat OpenShift Service Mesh for Power | 2.1 | ppc64le |
| Red Hat OpenShift Service Mesh for IBM Z | 2.1 | s390x |
Updated Packages
- servicemesh-pilot-agent-2.1.5-1.el8.s390x.rpm
- servicemesh-pilot-discovery-2.1.5-1.el8.s390x.rpm
- servicemesh-proxy-2.1.5-1.el8.ppc64le.rpm
- servicemesh-proxy-debugsource-2.1.5-1.el8.ppc64le.rpm
- servicemesh-2.1.5-1.el8.s390x.rpm
- servicemesh-operator-2.1.5-1.el8.ppc64le.rpm
- servicemesh-ratelimit-2.1.5-1.el8.ppc64le.rpm
- servicemesh-operator-2.1.5-1.el8.src.rpm
- servicemesh-ratelimit-2.1.5-1.el8.src.rpm
- servicemesh-cni-2.1.5-1.el8.s390x.rpm
- servicemesh-pilot-agent-2.1.5-1.el8.x86_64.rpm
- servicemesh-2.1.5-1.el8.src.rpm
- servicemesh-cni-2.1.5-1.el8.ppc64le.rpm
- servicemesh-proxy-debuginfo-2.1.5-1.el8.ppc64le.rpm
- servicemesh-ratelimit-2.1.5-1.el8.s390x.rpm
- servicemesh-pilot-discovery-2.1.5-1.el8.ppc64le.rpm
- servicemesh-prometheus-2.23.0-9.el8.s390x.rpm
- servicemesh-proxy-debugsource-2.1.5-1.el8.s390x.rpm
- servicemesh-2.1.5-1.el8.x86_64.rpm
- servicemesh-proxy-2.1.5-1.el8.s390x.rpm
- servicemesh-pilot-discovery-2.1.5-1.el8.x86_64.rpm
- servicemesh-prometheus-2.23.0-9.el8.ppc64le.rpm
- servicemesh-cni-2.1.5-1.el8.x86_64.rpm
- servicemesh-proxy-debuginfo-2.1.5-1.el8.s390x.rpm
- servicemesh-proxy-debugsource-2.1.5-1.el8.x86_64.rpm
- servicemesh-proxy-wasm-2.1.5-1.el8.noarch.rpm
- servicemesh-proxy-2.1.5-1.el8.x86_64.rpm
- servicemesh-prometheus-2.23.0-9.el8.src.rpm
- servicemesh-ratelimit-2.1.5-1.el8.x86_64.rpm
- servicemesh-proxy-debuginfo-2.1.5-1.el8.x86_64.rpm
- servicemesh-pilot-agent-2.1.5-1.el8.ppc64le.rpm
- servicemesh-proxy-2.1.5-1.el8.src.rpm
- servicemesh-2.1.5-1.el8.ppc64le.rpm
- servicemesh-operator-2.1.5-1.el8.x86_64.rpm
- servicemesh-prometheus-2.23.0-9.el8.x86_64.rpm
- servicemesh-operator-2.1.5-1.el8.s390x.rpm
Fixes
- This content is not included.BZ - 2064857
- This content is not included.BZ - 2072009
- This content is not included.BZ - 2077688
- This content is not included.BZ - 2077689
- This content is not included.BZ - 2084085
- This content is not included.BZ - 2092793
- This content is not included.BZ - 2105075
CVEs
- CVE-2022-24675
- CVE-2022-24785
- CVE-2022-24921
- CVE-2022-28327
- CVE-2022-29526
- CVE-2022-30629
- CVE-2022-31129
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.