RedHat: RHSA-2020-3090:01 Moderate: Red Hat OpenShift Service Mesh 1.1
Summary
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio
service mesh project, tailored for installation into an on-premise
OpenShift Container Platform installation.
Security Fix(es):
* envoyproxy/envoy: incorrectly validates TLS certificates when using
wildcards for DNS SAN's (CVE-2020-15104)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
The OpenShift Service Mesh release notes provide information on the
features and
known issues:
References
https://access.redhat.com/security/cve/CVE-2020-15104 https://access.redhat.com/security/updates/classification/#moderate
Package List
OpenShift Service Mesh 1.1:
Source:
servicemesh-proxy-1.1.5-1.el8.src.rpm
x86_64:
servicemesh-proxy-1.1.5-1.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for servicemesh-proxy is now available for OpenShift Service Mesh1.1.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
OpenShift Service Mesh 1.1 - x86_64
Bugs Fixed
1856232 - CVE-2020-15104 envoyproxy/envoy: incorrectly validates TLS certificates when using wildcards for DNS SAN's