-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat OpenShift Service Mesh 1.0.10 Jaeger and Kiali security update
Advisory ID:       RHSA-2020:0972-01
Product:           Red Hat OpenShift Service Mesh
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:0972
Issue date:        2020-03-25
CVE Names:         CVE-2020-8124 
====================================================================
1. Summary:

An update for Jaeger and Kiali is now available for Openshift Service Mesh
1.0.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenShift Service Mesh 1.0 - x86_64

3. Description:

Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio
service mesh project, tailored for installation into an on-premise
OpenShift Container Platform installation.

Security Fix(es):

* npmjs-url-parse: Improper validation of protocol of the returned URL
(CVE-2020-8124)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

The OpenShift Service Mesh release notes provide information on the
features and known issues:

https://docs.openshift.com/container-platform/4.3/service_mesh/v1x/servicemesh-release-notes.html

5. Bugs fixed (https://bugzilla.redhat.com/):

1800774 - CVE-2020-8124 npmjs-url-parse: Improper validation of protocol of the returned URL

6. Package List:

Red Hat OpenShift Service Mesh 1.0:

Source:
jaeger-v1.13.1.redhat6-1.el7.src.rpm
kiali-v1.0.10.redhat1-1.el7.src.rpm

x86_64:
jaeger-v1.13.1.redhat6-1.el7.x86_64.rpm
kiali-v1.0.10.redhat1-1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-8124
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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mtTt
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-0972:01 Moderate: Red Hat OpenShift Service Mesh 1.0.10

An update for Jaeger and Kiali is now available for Openshift Service Mesh 1.0

Summary

Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
Security Fix(es):
* npmjs-url-parse: Improper validation of protocol of the returned URL (CVE-2020-8124)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

The OpenShift Service Mesh release notes provide information on the features and known issues:
https://docs.openshift.com/container-platform/4.3/service_mesh/v1x/servicemesh-release-notes.html

References

https://access.redhat.com/security/cve/CVE-2020-8124 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat OpenShift Service Mesh 1.0:
Source: jaeger-v1.13.1.redhat6-1.el7.src.rpm kiali-v1.0.10.redhat1-1.el7.src.rpm
x86_64: jaeger-v1.13.1.redhat6-1.el7.x86_64.rpm kiali-v1.0.10.redhat1-1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:0972-01
Product: Red Hat OpenShift Service Mesh
Advisory URL: https://access.redhat.com/errata/RHSA-2020:0972
Issued Date: : 2020-03-25
CVE Names: CVE-2020-8124

Topic

An update for Jaeger and Kiali is now available for Openshift Service Mesh1.0.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat OpenShift Service Mesh 1.0 - x86_64


Bugs Fixed

1800774 - CVE-2020-8124 npmjs-url-parse: Improper validation of protocol of the returned URL


Related News