RedHat: RHSA-2019-0741:01 Important: Istio-Proxy Security Update
Summary
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio
service
mesh project, tailored for installation into an on-premise OpenShift
Container
Platform installation.
Security fix(es):
* istio-proxy: CVE-2019-9901 istio/envoy: Path traversal via URL Patch
manipulation in HTTP/1.x header. (CVE-2019-9900)
* istio-proxy: CVE-2019-9900 istio/envoy: Authorization bypass via null
characters injection in HTTP/1.x (CVE-2019-9901)
For more details about the security issue(s), including the impact, a CVSS
score,acknowledgements, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2019-9900 https://access.redhat.com/security/cve/CVE-2019-9901 https://access.redhat.com/security/updates/classification/#important
Package List
Red Hat OpenShift Service Mesh 0 Tech Preview:
Source:
servicemesh-proxy-0.9.1-1.el7.src.rpm
x86_64:
servicemesh-proxy-0.9.1-1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for Istio-Proxy is now available for Red Hat OpenShift ServiceMesh Tech Preview 0.9.0.Red Hat Product Security has rated this update as having a security impactofimportant. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat OpenShift Service Mesh 0 Tech Preview - x86_64
Bugs Fixed
1698020 - CVE-2019-9900 istio/envoy: Authorization bypass via null characters injection in HTTP/1.x
1698025 - CVE-2019-9901 istio/envoy: Path traversal via URL Patch manipulation in HTTP/1.x header