-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Red Hat OpenShift Service Mesh 1.1 servicemesh-operator security update
Advisory ID:       RHSA-2020:2795-01
Product:           Red Hat OpenShift Service Mesh
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:2795
Issue date:        2020-07-01
CVE Names:         CVE-2019-11253 CVE-2020-14306 
====================================================================
1. Summary:

An update for servicemesh-operator is now available for OpenShift Service
Mesh 1.1.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

OpenShift Service Mesh 1.1 - x86_64

3. Description:

Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio
service mesh project, tailored for installation into an on-premise
OpenShift Container Platform installation.

Security Fix(es):

* kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing
for remote denial of service (CVE-2019-11253)

* openshift-service-mesh/istio-rhel8-operator: control plane can deploy
gateway image to any namespace (CVE-2020-14306)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

The OpenShift Service Mesh release notes provide information on the
features and
known issues:


5. Bugs fixed (https://bugzilla.redhat.com/):

1757701 - CVE-2019-11253 kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service
1850380 - CVE-2020-14306 openshift-service-mesh/istio-rhel8-operator: control plane can deploy gateway image to any namespace

6. Package List:

OpenShift Service Mesh 1.1:

Source:
servicemesh-operator-1.1.4-3.el8.src.rpm

x86_64:
servicemesh-operator-1.1.4-3.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-11253
https://access.redhat.com/security/cve/CVE-2020-14306
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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javv
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-2795:01 Important: Red Hat OpenShift Service Mesh 1.1

An update for servicemesh-operator is now available for OpenShift Service Mesh 1.1

Summary

Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
Security Fix(es):
* kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service (CVE-2019-11253)
* openshift-service-mesh/istio-rhel8-operator: control plane can deploy gateway image to any namespace (CVE-2020-14306)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

The OpenShift Service Mesh release notes provide information on the features and known issues:

References

https://access.redhat.com/security/cve/CVE-2019-11253 https://access.redhat.com/security/cve/CVE-2020-14306 https://access.redhat.com/security/updates/classification/#important

Package List

OpenShift Service Mesh 1.1:
Source: servicemesh-operator-1.1.4-3.el8.src.rpm
x86_64: servicemesh-operator-1.1.4-3.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:2795-01
Product: Red Hat OpenShift Service Mesh
Advisory URL: https://access.redhat.com/errata/RHSA-2020:2795
Issued Date: : 2020-07-01
CVE Names: CVE-2019-11253 CVE-2020-14306

Topic

An update for servicemesh-operator is now available for OpenShift ServiceMesh 1.1.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

OpenShift Service Mesh 1.1 - x86_64


Bugs Fixed

1757701 - CVE-2019-11253 kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service

1850380 - CVE-2020-14306 openshift-service-mesh/istio-rhel8-operator: control plane can deploy gateway image to any namespace


Related News