First published: Thu Apr 07 2022(Updated: )
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.<br>This advisory covers the RPM packages for the release.<br>Security Fix(es):<br><li> gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)</li> <li> envoy: Incorrect configuration handling allows mTLS session re-use without re-validation (CVE-2022-21654)</li> <li> envoy: Incorrect handling of internal redirects to routes with a direct response entry (CVE-2022-21655)</li> <li> istio: Unauthenticated control plane denial of service attack due to stack exhaustion (CVE-2022-24726)</li> <li> golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)</li> <li> golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)</li> <li> nodejs-axios: Regular expression denial of service in trim function (CVE-2021-3749)</li> <li> ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)</li> <li> golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)</li> <li> golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)</li> <li> golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)</li> <li> envoy: Null pointer dereference when using JWT filter safe_regex match (CVE-2021-43824)</li> <li> envoy: Use-after-free when response filters increase response data (CVE-2021-43825)</li> <li> envoy: Use-after-free when tunneling TCP over HTTP (CVE-2021-43826)</li> <li> envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service (CVE-2022-23606)</li> <li> istio: unauthenticated control plane denial of service attack (CVE-2022-23635)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kiali-v1.24.7.redhat1 | <1.el8 | 1.el8 |
redhat/servicemesh | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-cni | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-operator | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-prometheus | <2.14.0-16.el8.1 | 2.14.0-16.el8.1 |
redhat/servicemesh-proxy | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/kiali-v1.24.7.redhat1 | <1.el8 | 1.el8 |
redhat/servicemesh | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-cni | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-istioctl | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-mixc | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-mixs | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-operator | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-pilot-agent | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-pilot-discovery | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-prometheus | <2.14.0-16.el8.1 | 2.14.0-16.el8.1 |
redhat/servicemesh-proxy | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/kiali-v1.24.7.redhat1 | <1.el8 | 1.el8 |
redhat/servicemesh | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-cni | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-istioctl | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-mixc | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-mixs | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-operator | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-pilot-agent | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-pilot-discovery | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-prometheus | <2.14.0-16.el8.1 | 2.14.0-16.el8.1 |
redhat/servicemesh-proxy | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-istioctl | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-mixc | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-mixs | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-pilot-agent | <2.0.9-3.el8 | 2.0.9-3.el8 |
redhat/servicemesh-pilot-discovery | <2.0.9-3.el8 | 2.0.9-3.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.