-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Red Hat OpenShift Service Mesh 2.0.7.1 security update
Advisory ID:       RHSA-2021:3272-01
Product:           Red Hat OpenShift Service Mesh
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:3272
Issue date:        2021-08-25
CVE Names:         CVE-2021-32777 CVE-2021-32779 CVE-2021-32781 
                   CVE-2021-39155 CVE-2021-39156 
====================================================================
1. Summary:

An update for servicemesh and servicemesh-proxy is now available for
OpenShift Service Mesh 2.0.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

2.0 - ppc64le, s390x, x86_64

3. Description:

Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio
service mesh project, tailored for installation into an on-premise
OpenShift Container Platform installation.

Security Fix(es):

* envoyproxy/envoy: HTTP request with multiple value headers can bypass
authorization policies (CVE-2021-32777)

* envoyproxy/envoy: HTTP request with a URL fragment in the URI can bypass
authorization policies (CVE-2021-32779)

* envoyproxy/envoy: denial of service when using extensions that modify
request or response sizes (CVE-2021-32781)

* istio/istio: HTTP request can bypass authorization mechanisms due to case
insensitive host comparison (CVE-2021-39155)

* istio/istio: HTTP request with fragment in URI can bypass authorization
mechanisms (CVE-2021-39156)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

The OpenShift Service Mesh Release Notes provide information on the
features and
known issues:

cemesh-release-notes.html

5. Bugs fixed (https://bugzilla.redhat.com/):

1996915 - CVE-2021-39156 istio/istio: HTTP request with fragment in URI can bypass authorization mechanisms
1996929 - CVE-2021-39155 istio/istio: HTTP request can bypass authorization mechanisms due to case insensitive host comparison
1996933 - CVE-2021-32777 envoyproxy/envoy: HTTP request with multiple value headers can bypass authorization policies
1996934 - CVE-2021-32779 envoyproxy/envoy: HTTP request with a URL fragment in the URI can bypass authorization policies
1996935 - CVE-2021-32781 envoyproxy/envoy: denial of service when using extensions that modify request or response sizes

6. Package List:

2.0:

Source:
servicemesh-2.0.7-3.el8.src.rpm
servicemesh-proxy-2.0.7-3.el8.src.rpm

ppc64le:
servicemesh-2.0.7-3.el8.ppc64le.rpm
servicemesh-istioctl-2.0.7-3.el8.ppc64le.rpm
servicemesh-mixc-2.0.7-3.el8.ppc64le.rpm
servicemesh-mixs-2.0.7-3.el8.ppc64le.rpm
servicemesh-pilot-agent-2.0.7-3.el8.ppc64le.rpm
servicemesh-pilot-discovery-2.0.7-3.el8.ppc64le.rpm
servicemesh-proxy-2.0.7-3.el8.ppc64le.rpm

s390x:
servicemesh-2.0.7-3.el8.s390x.rpm
servicemesh-istioctl-2.0.7-3.el8.s390x.rpm
servicemesh-mixc-2.0.7-3.el8.s390x.rpm
servicemesh-mixs-2.0.7-3.el8.s390x.rpm
servicemesh-pilot-agent-2.0.7-3.el8.s390x.rpm
servicemesh-pilot-discovery-2.0.7-3.el8.s390x.rpm
servicemesh-proxy-2.0.7-3.el8.s390x.rpm

x86_64:
servicemesh-2.0.7-3.el8.x86_64.rpm
servicemesh-istioctl-2.0.7-3.el8.x86_64.rpm
servicemesh-mixc-2.0.7-3.el8.x86_64.rpm
servicemesh-mixs-2.0.7-3.el8.x86_64.rpm
servicemesh-pilot-agent-2.0.7-3.el8.x86_64.rpm
servicemesh-pilot-discovery-2.0.7-3.el8.x86_64.rpm
servicemesh-proxy-2.0.7-3.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-32777
https://access.redhat.com/security/cve/CVE-2021-32779
https://access.redhat.com/security/cve/CVE-2021-32781
https://access.redhat.com/security/cve/CVE-2021-39155
https://access.redhat.com/security/cve/CVE-2021-39156
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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lGLC
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-3272:01 Important: Red Hat OpenShift Service Mesh 2.0.7.1

An update for servicemesh and servicemesh-proxy is now available for OpenShift Service Mesh 2.0

Summary

Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
Security Fix(es):
* envoyproxy/envoy: HTTP request with multiple value headers can bypass authorization policies (CVE-2021-32777)
* envoyproxy/envoy: HTTP request with a URL fragment in the URI can bypass authorization policies (CVE-2021-32779)
* envoyproxy/envoy: denial of service when using extensions that modify request or response sizes (CVE-2021-32781)
* istio/istio: HTTP request can bypass authorization mechanisms due to case insensitive host comparison (CVE-2021-39155)
* istio/istio: HTTP request with fragment in URI can bypass authorization mechanisms (CVE-2021-39156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

The OpenShift Service Mesh Release Notes provide information on the features and known issues:
cemesh-release-notes.html

References

https://access.redhat.com/security/cve/CVE-2021-32777 https://access.redhat.com/security/cve/CVE-2021-32779 https://access.redhat.com/security/cve/CVE-2021-32781 https://access.redhat.com/security/cve/CVE-2021-39155 https://access.redhat.com/security/cve/CVE-2021-39156 https://access.redhat.com/security/updates/classification/#important

Package List

2.0:
Source: servicemesh-2.0.7-3.el8.src.rpm servicemesh-proxy-2.0.7-3.el8.src.rpm
ppc64le: servicemesh-2.0.7-3.el8.ppc64le.rpm servicemesh-istioctl-2.0.7-3.el8.ppc64le.rpm servicemesh-mixc-2.0.7-3.el8.ppc64le.rpm servicemesh-mixs-2.0.7-3.el8.ppc64le.rpm servicemesh-pilot-agent-2.0.7-3.el8.ppc64le.rpm servicemesh-pilot-discovery-2.0.7-3.el8.ppc64le.rpm servicemesh-proxy-2.0.7-3.el8.ppc64le.rpm
s390x: servicemesh-2.0.7-3.el8.s390x.rpm servicemesh-istioctl-2.0.7-3.el8.s390x.rpm servicemesh-mixc-2.0.7-3.el8.s390x.rpm servicemesh-mixs-2.0.7-3.el8.s390x.rpm servicemesh-pilot-agent-2.0.7-3.el8.s390x.rpm servicemesh-pilot-discovery-2.0.7-3.el8.s390x.rpm servicemesh-proxy-2.0.7-3.el8.s390x.rpm
x86_64: servicemesh-2.0.7-3.el8.x86_64.rpm servicemesh-istioctl-2.0.7-3.el8.x86_64.rpm servicemesh-mixc-2.0.7-3.el8.x86_64.rpm servicemesh-mixs-2.0.7-3.el8.x86_64.rpm servicemesh-pilot-agent-2.0.7-3.el8.x86_64.rpm servicemesh-pilot-discovery-2.0.7-3.el8.x86_64.rpm servicemesh-proxy-2.0.7-3.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2021:3272-01
Product: Red Hat OpenShift Service Mesh
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3272
Issued Date: : 2021-08-25
CVE Names: CVE-2021-32777 CVE-2021-32779 CVE-2021-32781 CVE-2021-39155 CVE-2021-39156

Topic

An update for servicemesh and servicemesh-proxy is now available forOpenShift Service Mesh 2.0.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

2.0 - ppc64le, s390x, x86_64


Bugs Fixed

1996915 - CVE-2021-39156 istio/istio: HTTP request with fragment in URI can bypass authorization mechanisms

1996929 - CVE-2021-39155 istio/istio: HTTP request can bypass authorization mechanisms due to case insensitive host comparison

1996933 - CVE-2021-32777 envoyproxy/envoy: HTTP request with multiple value headers can bypass authorization policies

1996934 - CVE-2021-32779 envoyproxy/envoy: HTTP request with a URL fragment in the URI can bypass authorization policies

1996935 - CVE-2021-32781 envoyproxy/envoy: denial of service when using extensions that modify request or response sizes


Related News