First published: Mon Jun 13 2022(Updated: )
Red Hat OpenShift Service Mesh is a Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.<br>This advisory covers the RPM packages for the release.<br>Security Fix(es):<br><li> envoy: oauth filter allows trivial bypass (CVE-2022-29226)</li> <li> envoy: Decompressors can be zip bombed (CVE-2022-29225)</li> <li> envoy: oauth filter calls continueDecoding() from within decodeHeaders() (CVE-2022-29228)</li> <li> golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)</li> <li> golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)</li> <li> golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806)</li> <li> envoy: Segfault in GrpcHealthCheckerImpl (CVE-2022-29224)</li> <li> Istio: Unsafe memory access in metadata exchange (CVE-2022-31045)</li> For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, see the CVE page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/servicemesh | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-operator | <2.1.3-2.el8 | 2.1.3-2.el8 |
redhat/servicemesh-prometheus | <2.23.0-7.el8 | 2.23.0-7.el8 |
redhat/servicemesh-proxy | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-ratelimit | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-cni | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-operator | <2.1.3-2.el8 | 2.1.3-2.el8 |
redhat/servicemesh-pilot-agent | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-pilot-discovery | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-prometheus | <2.23.0-7.el8 | 2.23.0-7.el8 |
redhat/servicemesh-proxy | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-proxy-debuginfo | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-proxy-debugsource | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-proxy-wasm | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-ratelimit | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-cni | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-operator | <2.1.3-2.el8 | 2.1.3-2.el8 |
redhat/servicemesh-pilot-agent | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-pilot-discovery | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-prometheus | <2.23.0-7.el8 | 2.23.0-7.el8 |
redhat/servicemesh-proxy | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-proxy-debuginfo | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-proxy-debugsource | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-ratelimit | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-cni | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-pilot-agent | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-pilot-discovery | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-proxy-debuginfo | <2.1.3-1.el8 | 2.1.3-1.el8 |
redhat/servicemesh-proxy-debugsource | <2.1.3-1.el8 | 2.1.3-1.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:5004 is classified as important.
To fix RHSA-2022:5004, upgrade to the patched versions of the affected packages specified in the advisory.
RHSA-2022:5004 affects several packages including servicemesh, servicemesh-operator, and servicemesh-proxy.
RHSA-2022:5004 impacts systems utilizing Red Hat OpenShift Service Mesh for on-premise installations.
Yes, you should update to the recommended version specified in the advisory, such as 2.1.3-1.el8 for many affected packages.