RedHat: RHSA-2021-2085:01 Important: servicemesh security update

Advisories

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: servicemesh security update
Advisory ID:       RHSA-2021:2085-01
Product:           Red Hat OpenShift Service Mesh
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:2085
Issue date:        2021-05-20
CVE Names:         CVE-2021-31921 
=====================================================================

1. Summary:

An update for servicemesh is now available for OpenShift Service Mesh 1.1.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

OpenShift Service Mesh 1.1 - ppc64le, s390x, x86_64

3. Description:

Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio
service mesh project, tailored for installation into an on-premise
OpenShift Container Platform installation.
Security Fix(es):

* istio/istio: authorization bypass when using AUTO_PASSTHROUGH
(CVE-2021-31921)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1955396 - CVE-2021-31921 istio/istio: authorization bypass when using AUTO_PASSTHROUGH

6. Package List:

OpenShift Service Mesh 1.1:

Source:
servicemesh-1.1.15-4.el8.src.rpm

ppc64le:
servicemesh-1.1.15-4.el8.ppc64le.rpm
servicemesh-citadel-1.1.15-4.el8.ppc64le.rpm
servicemesh-galley-1.1.15-4.el8.ppc64le.rpm
servicemesh-istioctl-1.1.15-4.el8.ppc64le.rpm
servicemesh-mixc-1.1.15-4.el8.ppc64le.rpm
servicemesh-mixs-1.1.15-4.el8.ppc64le.rpm
servicemesh-pilot-agent-1.1.15-4.el8.ppc64le.rpm
servicemesh-pilot-discovery-1.1.15-4.el8.ppc64le.rpm
servicemesh-sidecar-injector-1.1.15-4.el8.ppc64le.rpm

s390x:
servicemesh-1.1.15-4.el8.s390x.rpm
servicemesh-citadel-1.1.15-4.el8.s390x.rpm
servicemesh-galley-1.1.15-4.el8.s390x.rpm
servicemesh-istioctl-1.1.15-4.el8.s390x.rpm
servicemesh-mixc-1.1.15-4.el8.s390x.rpm
servicemesh-mixs-1.1.15-4.el8.s390x.rpm
servicemesh-pilot-agent-1.1.15-4.el8.s390x.rpm
servicemesh-pilot-discovery-1.1.15-4.el8.s390x.rpm
servicemesh-sidecar-injector-1.1.15-4.el8.s390x.rpm

x86_64:
servicemesh-1.1.15-4.el8.x86_64.rpm
servicemesh-citadel-1.1.15-4.el8.x86_64.rpm
servicemesh-galley-1.1.15-4.el8.x86_64.rpm
servicemesh-istioctl-1.1.15-4.el8.x86_64.rpm
servicemesh-mixc-1.1.15-4.el8.x86_64.rpm
servicemesh-mixs-1.1.15-4.el8.x86_64.rpm
servicemesh-pilot-agent-1.1.15-4.el8.x86_64.rpm
servicemesh-pilot-discovery-1.1.15-4.el8.x86_64.rpm
servicemesh-sidecar-injector-1.1.15-4.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-31921
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYKa5mNzjgjWX9erEAQhl7xAAmeuZZMXkuyAp3I3dK905naVgdePVeYo4
Z5xVyVnSxYABGz489TjFSYlMwLzpBOoHdcTx7yZd2HCXWJmh4c6hzNiBbcqhv5qh
l37dGdbcVj9Xo7i001hzhUsvKlEl0qW/SOtDr4KeDpOJiEWjlun4BOhp16Fh9EXN
lCmxAkxyCaWCbjDBPbu/SGkxVB2echPSqPRGSqiayUF9nCF0UX7TnmdouvyaOSBZ
KJr6HKDKpVyPYgwjz0xO/XNgPAeh+4v76fQOQtuu7RTjKWJYuHt8HecnY78jAZVI
qSsPFNDMLyhnD/o4xiCYc7tPjmSD/FP6QsPK5qBsafmMY3Eqrd7Bkq7dtngJt8Pz
S4WuRqXU2I3B65dTn8V8ZOba2B9CibnCmhSQ08CBX4047dQEAqykOBKFutMO5AVT
O6sR+EX+vJ7B7PBL3/c6QMJ3suPpAg02kDa2YrIQB4mVPlhQ7B7EIiYNu6LxIQ5j
B/WtoIqY24dVsXudwZz8yIIsl1I/eFjWUZozVm9DKZflsTm/A2kJJdTjHV6iI+LG
Ebq4wv8opqVbO34ahh9QVExPmd3pnWOsMnxeR9UaRCDbCyW5+xhRCteLvE6nm3Wd
vULMcehGnJ5QoEJp45ZibCujEEtWULRWjxdtVFC5P6jYLCY0v2INaBQiaVNB7/9I
V2TU6lxJ74w=
=HEz8
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-2085:01 Important: servicemesh security update

An update for servicemesh is now available for OpenShift Service Mesh 1.1

Summary

Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Security Fix(es):
* istio/istio: authorization bypass when using AUTO_PASSTHROUGH (CVE-2021-31921)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changesdescribed in this advisory, refer to:https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2021-31921 https://access.redhat.com/security/updates/classification/#important

Package List

OpenShift Service Mesh 1.1:
Source: servicemesh-1.1.15-4.el8.src.rpm
ppc64le: servicemesh-1.1.15-4.el8.ppc64le.rpm servicemesh-citadel-1.1.15-4.el8.ppc64le.rpm servicemesh-galley-1.1.15-4.el8.ppc64le.rpm servicemesh-istioctl-1.1.15-4.el8.ppc64le.rpm servicemesh-mixc-1.1.15-4.el8.ppc64le.rpm servicemesh-mixs-1.1.15-4.el8.ppc64le.rpm servicemesh-pilot-agent-1.1.15-4.el8.ppc64le.rpm servicemesh-pilot-discovery-1.1.15-4.el8.ppc64le.rpm servicemesh-sidecar-injector-1.1.15-4.el8.ppc64le.rpm
s390x: servicemesh-1.1.15-4.el8.s390x.rpm servicemesh-citadel-1.1.15-4.el8.s390x.rpm servicemesh-galley-1.1.15-4.el8.s390x.rpm servicemesh-istioctl-1.1.15-4.el8.s390x.rpm servicemesh-mixc-1.1.15-4.el8.s390x.rpm servicemesh-mixs-1.1.15-4.el8.s390x.rpm servicemesh-pilot-agent-1.1.15-4.el8.s390x.rpm servicemesh-pilot-discovery-1.1.15-4.el8.s390x.rpm servicemesh-sidecar-injector-1.1.15-4.el8.s390x.rpm
x86_64: servicemesh-1.1.15-4.el8.x86_64.rpm servicemesh-citadel-1.1.15-4.el8.x86_64.rpm servicemesh-galley-1.1.15-4.el8.x86_64.rpm servicemesh-istioctl-1.1.15-4.el8.x86_64.rpm servicemesh-mixc-1.1.15-4.el8.x86_64.rpm servicemesh-mixs-1.1.15-4.el8.x86_64.rpm servicemesh-pilot-agent-1.1.15-4.el8.x86_64.rpm servicemesh-pilot-discovery-1.1.15-4.el8.x86_64.rpm servicemesh-sidecar-injector-1.1.15-4.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

Severity
Advisory ID: RHSA-2021:2085-01
Product: Red Hat OpenShift Service Mesh
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2085
Issued Date: : 2021-05-20
CVE Names: CVE-2021-31921

Topic

An update for servicemesh is now available for OpenShift Service Mesh 1.1.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.

Relevant Releases Architectures

OpenShift Service Mesh 1.1 - ppc64le, s390x, x86_64

Bugs Fixed

1955396 - CVE-2021-31921 istio/istio: authorization bypass when using AUTO_PASSTHROUGH

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.