RedHat: RHSA-2021-1540:01 Important: Red Hat OpenShift Service Mesh...

Advisories

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat OpenShift Service Mesh 1.1.14 security update
Advisory ID:       RHSA-2021:1540-01
Product:           Red Hat OpenShift Service Mesh
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:1540
Issue date:        2021-05-11
CVE Names:         CVE-2021-29492 CVE-2021-31920 
=====================================================================

1. Summary:

An update for servicemesh and servicemesh-proxy is now available for
OpenShift Service Mesh 1.1.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

OpenShift Service Mesh 1.1 - ppc64le, s390x, x86_64

3. Description:

Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio
service mesh project, tailored for installation into an on-premise
OpenShift Container Platform installation.

Security Fix(es):

* envoyproxy/envoy: HTTP request with escaped slash characters can bypass
Envoy's authorization mechanisms (CVE-2021-29492)

* istio/istio: HTTP request with escaped slash characters can bypass
authorization mechanisms (CVE-2021-31920)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1951188 - CVE-2021-29492 envoyproxy/envoy: HTTP request with escaped slash characters can bypass Envoy's authorization mechanisms
1959481 - CVE-2021-31920 istio/istio: HTTP request with escaped slash characters can bypass authorization mechanisms

6. Package List:

OpenShift Service Mesh 1.1:

Source:
servicemesh-1.1.14-1.el8.src.rpm
servicemesh-proxy-1.1.14-1.el8.src.rpm

ppc64le:
servicemesh-1.1.14-1.el8.ppc64le.rpm
servicemesh-citadel-1.1.14-1.el8.ppc64le.rpm
servicemesh-galley-1.1.14-1.el8.ppc64le.rpm
servicemesh-istioctl-1.1.14-1.el8.ppc64le.rpm
servicemesh-mixc-1.1.14-1.el8.ppc64le.rpm
servicemesh-mixs-1.1.14-1.el8.ppc64le.rpm
servicemesh-pilot-agent-1.1.14-1.el8.ppc64le.rpm
servicemesh-pilot-discovery-1.1.14-1.el8.ppc64le.rpm
servicemesh-proxy-1.1.14-1.el8.ppc64le.rpm
servicemesh-sidecar-injector-1.1.14-1.el8.ppc64le.rpm

s390x:
servicemesh-1.1.14-1.el8.s390x.rpm
servicemesh-citadel-1.1.14-1.el8.s390x.rpm
servicemesh-galley-1.1.14-1.el8.s390x.rpm
servicemesh-istioctl-1.1.14-1.el8.s390x.rpm
servicemesh-mixc-1.1.14-1.el8.s390x.rpm
servicemesh-mixs-1.1.14-1.el8.s390x.rpm
servicemesh-pilot-agent-1.1.14-1.el8.s390x.rpm
servicemesh-pilot-discovery-1.1.14-1.el8.s390x.rpm
servicemesh-proxy-1.1.14-1.el8.s390x.rpm
servicemesh-sidecar-injector-1.1.14-1.el8.s390x.rpm

x86_64:
servicemesh-1.1.14-1.el8.x86_64.rpm
servicemesh-citadel-1.1.14-1.el8.x86_64.rpm
servicemesh-galley-1.1.14-1.el8.x86_64.rpm
servicemesh-istioctl-1.1.14-1.el8.x86_64.rpm
servicemesh-mixc-1.1.14-1.el8.x86_64.rpm
servicemesh-mixs-1.1.14-1.el8.x86_64.rpm
servicemesh-pilot-agent-1.1.14-1.el8.x86_64.rpm
servicemesh-pilot-discovery-1.1.14-1.el8.x86_64.rpm
servicemesh-proxy-1.1.14-1.el8.x86_64.rpm
servicemesh-sidecar-injector-1.1.14-1.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-29492
https://access.redhat.com/security/cve/CVE-2021-31920
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYJsTptzjgjWX9erEAQjD6Q//TLW5gTWN1n2Z0WFwhfjNQTekhwDEHMnK
rZDm9x4icMuamI1rfXNoNtckRvAvd7ynUezrfkczEFiPnE8o1dzxI/7K/yZDYPxD
ZzA/fyRIDEJ1PcN8oycCxZSkZqsDE1KYc+JahZXkcKJUDSdin+1Qz3jupQQ6Xjas
S+LccPdqW3UTxUmsCl/g777aMdws9oQSW9Sf48tmBHjcq16iTheSieZzFWCWxC7u
ES+PNF2Yf6SgP2IE28kDGjgA12pxd2exMf9Y9CU2/xdUQGgQW0+f8cRhzDiUfDcE
bBMY0539CE9dxDhlp4rEycssau/KP9ClwLgdS90tKiDxE0rdFHHgHg46fEMOtOnk
BJwyN0hhEm5m0Y+IAL1r82WO7Ib2i2DET80MM39s/5VZGSbE5MzudUZeixNl99h8
zFxqwknz3JEk0wqni/zsw1ChSTZ9Y96xibzoYJCurLhPE4fCxDgfHaS3Ryj0/C/c
y/7TCudQt4lP53Wvw64yX7ZloUZHcCJ3y1ufdOe/x1n/a9hRu/orLqzMXIer5N3y
GbZIgiS5cSMk5OTYixeGg64Wt2U64o3CJH/srm+H90bYTP/yCVqpGQOfZHIS5bkb
UzhzGq4kNVOLQwjsHYg53L9gUtOq8teArfwscp2drBhFfDDOANNDPtSb5xVAKwYg
B5nX9PM16Nc=
=sHzY
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-1540:01 Important: Red Hat OpenShift Service Mesh 1.1.14

An update for servicemesh and servicemesh-proxy is now available for OpenShift Service Mesh 1.1

Summary

Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
Security Fix(es):
* envoyproxy/envoy: HTTP request with escaped slash characters can bypass Envoy's authorization mechanisms (CVE-2021-29492)
* istio/istio: HTTP request with escaped slash characters can bypass authorization mechanisms (CVE-2021-31920)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changesdescribed in this advisory, refer to:https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2021-29492 https://access.redhat.com/security/cve/CVE-2021-31920 https://access.redhat.com/security/updates/classification/#important

Package List

OpenShift Service Mesh 1.1:
Source: servicemesh-1.1.14-1.el8.src.rpm servicemesh-proxy-1.1.14-1.el8.src.rpm
ppc64le: servicemesh-1.1.14-1.el8.ppc64le.rpm servicemesh-citadel-1.1.14-1.el8.ppc64le.rpm servicemesh-galley-1.1.14-1.el8.ppc64le.rpm servicemesh-istioctl-1.1.14-1.el8.ppc64le.rpm servicemesh-mixc-1.1.14-1.el8.ppc64le.rpm servicemesh-mixs-1.1.14-1.el8.ppc64le.rpm servicemesh-pilot-agent-1.1.14-1.el8.ppc64le.rpm servicemesh-pilot-discovery-1.1.14-1.el8.ppc64le.rpm servicemesh-proxy-1.1.14-1.el8.ppc64le.rpm servicemesh-sidecar-injector-1.1.14-1.el8.ppc64le.rpm
s390x: servicemesh-1.1.14-1.el8.s390x.rpm servicemesh-citadel-1.1.14-1.el8.s390x.rpm servicemesh-galley-1.1.14-1.el8.s390x.rpm servicemesh-istioctl-1.1.14-1.el8.s390x.rpm servicemesh-mixc-1.1.14-1.el8.s390x.rpm servicemesh-mixs-1.1.14-1.el8.s390x.rpm servicemesh-pilot-agent-1.1.14-1.el8.s390x.rpm servicemesh-pilot-discovery-1.1.14-1.el8.s390x.rpm servicemesh-proxy-1.1.14-1.el8.s390x.rpm servicemesh-sidecar-injector-1.1.14-1.el8.s390x.rpm
x86_64: servicemesh-1.1.14-1.el8.x86_64.rpm servicemesh-citadel-1.1.14-1.el8.x86_64.rpm servicemesh-galley-1.1.14-1.el8.x86_64.rpm servicemesh-istioctl-1.1.14-1.el8.x86_64.rpm servicemesh-mixc-1.1.14-1.el8.x86_64.rpm servicemesh-mixs-1.1.14-1.el8.x86_64.rpm servicemesh-pilot-agent-1.1.14-1.el8.x86_64.rpm servicemesh-pilot-discovery-1.1.14-1.el8.x86_64.rpm servicemesh-proxy-1.1.14-1.el8.x86_64.rpm servicemesh-sidecar-injector-1.1.14-1.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

Severity
Advisory ID: RHSA-2021:1540-01
Product: Red Hat OpenShift Service Mesh
Advisory URL: https://access.redhat.com/errata/RHSA-2021:1540
Issued Date: : 2021-05-11
CVE Names: CVE-2021-29492 CVE-2021-31920

Topic

An update for servicemesh and servicemesh-proxy is now available forOpenShift Service Mesh 1.1.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.

Relevant Releases Architectures

OpenShift Service Mesh 1.1 - ppc64le, s390x, x86_64

Bugs Fixed

1951188 - CVE-2021-29492 envoyproxy/envoy: HTTP request with escaped slash characters can bypass Envoy's authorization mechanisms

1959481 - CVE-2021-31920 istio/istio: HTTP request with escaped slash characters can bypass authorization mechanisms

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.