RedHat: RHSA-2022-1276:01 Important: Red Hat OpenShift Service Mesh 2.0.9
Summary
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio
service mesh project, tailored for installation into an on-premise
OpenShift Container Platform installation.
This advisory covers the RPM packages for the release.
Security Fix(es):
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index
validation (CVE-2021-3121)
* envoy: Incorrect configuration handling allows mTLS session re-use
without re-validation (CVE-2022-21654)
* envoy: Incorrect handling of internal redirects to routes with a direct
response entry (CVE-2022-21655)
* istio: Unauthenticated control plane denial of service attack due to
stack exhaustion (CVE-2022-24726)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing
- -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing
bcp47 tag (CVE-2020-28852)
* nodejs-axios: Regular expression denial of service in trim function
(CVE-2021-3749)
* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service
(CVE-2021-29482)
* golang: net: incorrect parsing of extraneous zero characters at the
beginning of an IP address octet (CVE-2021-29923)
* golang: net/http/httputil: panic due to racy read of persistConn after
handler panic (CVE-2021-36221)
* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
* envoy: Null pointer dereference when using JWT filter safe_regex match
(CVE-2021-43824)
* envoy: Use-after-free when response filters increase response data
(CVE-2021-43825)
* envoy: Use-after-free when tunneling TCP over HTTP (CVE-2021-43826)
* envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery
Service (CVE-2022-23606)
* istio: unauthenticated control plane denial of service attack
(CVE-2022-23635)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
The OpenShift Service Mesh release notes provide information on the
features and known issues:
https://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html
References
https://access.redhat.com/security/cve/CVE-2020-28851 https://access.redhat.com/security/cve/CVE-2020-28852 https://access.redhat.com/security/cve/CVE-2021-3121 https://access.redhat.com/security/cve/CVE-2021-3749 https://access.redhat.com/security/cve/CVE-2021-29482 https://access.redhat.com/security/cve/CVE-2021-29923 https://access.redhat.com/security/cve/CVE-2021-36221 https://access.redhat.com/security/cve/CVE-2021-43565 https://access.redhat.com/security/cve/CVE-2021-43824 https://access.redhat.com/security/cve/CVE-2021-43825 https://access.redhat.com/security/cve/CVE-2021-43826 https://access.redhat.com/security/cve/CVE-2022-21654 https://access.redhat.com/security/cve/CVE-2022-21655 https://access.redhat.com/security/cve/CVE-2022-23606 https://access.redhat.com/security/cve/CVE-2022-23635 https://access.redhat.com/security/cve/CVE-2022-24726 https://access.redhat.com/security/updates/classification/#important
Package List
2.0:
Source:
kiali-v1.24.7.redhat1-1.el8.src.rpm
servicemesh-2.0.9-3.el8.src.rpm
servicemesh-cni-2.0.9-3.el8.src.rpm
servicemesh-operator-2.0.9-3.el8.src.rpm
servicemesh-prometheus-2.14.0-16.el8.1.src.rpm
servicemesh-proxy-2.0.9-3.el8.src.rpm
ppc64le:
kiali-v1.24.7.redhat1-1.el8.ppc64le.rpm
servicemesh-2.0.9-3.el8.ppc64le.rpm
servicemesh-cni-2.0.9-3.el8.ppc64le.rpm
servicemesh-istioctl-2.0.9-3.el8.ppc64le.rpm
servicemesh-mixc-2.0.9-3.el8.ppc64le.rpm
servicemesh-mixs-2.0.9-3.el8.ppc64le.rpm
servicemesh-operator-2.0.9-3.el8.ppc64le.rpm
servicemesh-pilot-agent-2.0.9-3.el8.ppc64le.rpm
servicemesh-pilot-discovery-2.0.9-3.el8.ppc64le.rpm
servicemesh-prometheus-2.14.0-16.el8.1.ppc64le.rpm
servicemesh-proxy-2.0.9-3.el8.ppc64le.rpm
s390x:
kiali-v1.24.7.redhat1-1.el8.s390x.rpm
servicemesh-2.0.9-3.el8.s390x.rpm
servicemesh-cni-2.0.9-3.el8.s390x.rpm
servicemesh-istioctl-2.0.9-3.el8.s390x.rpm
servicemesh-mixc-2.0.9-3.el8.s390x.rpm
servicemesh-mixs-2.0.9-3.el8.s390x.rpm
servicemesh-operator-2.0.9-3.el8.s390x.rpm
servicemesh-pilot-agent-2.0.9-3.el8.s390x.rpm
servicemesh-pilot-discovery-2.0.9-3.el8.s390x.rpm
servicemesh-prometheus-2.14.0-16.el8.1.s390x.rpm
servicemesh-proxy-2.0.9-3.el8.s390x.rpm
x86_64:
kiali-v1.24.7.redhat1-1.el8.x86_64.rpm
servicemesh-2.0.9-3.el8.x86_64.rpm
servicemesh-cni-2.0.9-3.el8.x86_64.rpm
servicemesh-istioctl-2.0.9-3.el8.x86_64.rpm
servicemesh-mixc-2.0.9-3.el8.x86_64.rpm
servicemesh-mixs-2.0.9-3.el8.x86_64.rpm
servicemesh-operator-2.0.9-3.el8.x86_64.rpm
servicemesh-pilot-agent-2.0.9-3.el8.x86_64.rpm
servicemesh-pilot-discovery-2.0.9-3.el8.x86_64.rpm
servicemesh-prometheus-2.14.0-16.el8.1.x86_64.rpm
servicemesh-proxy-2.0.9-3.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
Red Hat OpenShift Service Mesh 2.0.9.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.
Topic
Relevant Releases Architectures
2.0 - ppc64le, s390x, x86_64
Bugs Fixed
1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
1954368 - CVE-2021-29482 ulikunitz/xz: Infinite loop in readUvarint allows for denial of service
1992006 - CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic
1999784 - CVE-2021-3749 nodejs-axios: Regular expression denial of service in trim function
2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic
2050744 - CVE-2021-43824 envoy: Null pointer dereference when using JWT filter safe_regex match
2050746 - CVE-2021-43825 envoy: Use-after-free when response filters increase response data
2050748 - CVE-2021-43826 envoy: Use-after-free when tunneling TCP over HTTP
2050753 - CVE-2022-21654 envoy: Incorrect configuration handling allows mTLS session re-use without re-validation
2050757 - CVE-2022-21655 envoy: Incorrect handling of internal redirects to routes with a direct response entry
2050758 - CVE-2022-23606 envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service
2057277 - CVE-2022-23635 istio: unauthenticated control plane denial of service attack
2061638 - CVE-2022-24726 istio: Unauthenticated control plane denial of service attack due to stack exhaustion