RedHat: RHSA-2022-5004:01 Critical: Red Hat OpenShift Service Mesh 2.1.3
Summary
Red Hat OpenShift Service Mesh is a Red Hat distribution of the Istio
service mesh project, tailored for installation into an on-premise
OpenShift Container Platform installation.
This advisory covers the RPM packages for the release.
Security Fix(es):
* envoy: oauth filter allows trivial bypass (CVE-2022-29226)
* envoy: Decompressors can be zip bombed (CVE-2022-29225)
* envoy: oauth filter calls continueDecoding() from within decodeHeaders()
(CVE-2022-29228)
* golang: math/big: uncontrolled memory consumption due to an unhandled
overflow via Rat.SetString (CVE-2022-23772)
* golang: cmd/go: misinterpretation of branch names can lead to incorrect
access control (CVE-2022-23773)
* golang: crypto/elliptic IsOnCurve returns true for invalid field elements
(CVE-2022-23806)
* envoy: Segfault in GrpcHealthCheckerImpl (CVE-2022-29224)
* Istio: Unsafe memory access in metadata exchange (CVE-2022-31045)
For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, see the CVE page
listed in the References section.
Summary
Solution
The OpenShift Service Mesh Release Notes provide information on the
features and known issues. See the link in the References section.
References
https://access.redhat.com/security/cve/CVE-2022-23772 https://access.redhat.com/security/cve/CVE-2022-23773 https://access.redhat.com/security/cve/CVE-2022-23806 https://access.redhat.com/security/cve/CVE-2022-29224 https://access.redhat.com/security/cve/CVE-2022-29225 https://access.redhat.com/security/cve/CVE-2022-29226 https://access.redhat.com/security/cve/CVE-2022-29228 https://access.redhat.com/security/cve/CVE-2022-31045 https://access.redhat.com/security/updates/classification/#critical https://docs.openshift.com/container-platform/4.14/service_mesh/v2x/servicemesh-release-notes.html
Package List
OpenShift Service Mesh 2.1:
Source:
servicemesh-2.1.3-1.el8.src.rpm
servicemesh-operator-2.1.3-2.el8.src.rpm
servicemesh-prometheus-2.23.0-7.el8.src.rpm
servicemesh-proxy-2.1.3-1.el8.src.rpm
servicemesh-ratelimit-2.1.3-1.el8.src.rpm
noarch:
servicemesh-proxy-wasm-2.1.3-1.el8.noarch.rpm
ppc64le:
servicemesh-2.1.3-1.el8.ppc64le.rpm
servicemesh-cni-2.1.3-1.el8.ppc64le.rpm
servicemesh-operator-2.1.3-2.el8.ppc64le.rpm
servicemesh-pilot-agent-2.1.3-1.el8.ppc64le.rpm
servicemesh-pilot-discovery-2.1.3-1.el8.ppc64le.rpm
servicemesh-prometheus-2.23.0-7.el8.ppc64le.rpm
servicemesh-proxy-2.1.3-1.el8.ppc64le.rpm
servicemesh-proxy-debuginfo-2.1.3-1.el8.ppc64le.rpm
servicemesh-proxy-debugsource-2.1.3-1.el8.ppc64le.rpm
servicemesh-ratelimit-2.1.3-1.el8.ppc64le.rpm
s390x:
servicemesh-2.1.3-1.el8.s390x.rpm
servicemesh-cni-2.1.3-1.el8.s390x.rpm
servicemesh-operator-2.1.3-2.el8.s390x.rpm
servicemesh-pilot-agent-2.1.3-1.el8.s390x.rpm
servicemesh-pilot-discovery-2.1.3-1.el8.s390x.rpm
servicemesh-prometheus-2.23.0-7.el8.s390x.rpm
servicemesh-proxy-2.1.3-1.el8.s390x.rpm
servicemesh-proxy-debuginfo-2.1.3-1.el8.s390x.rpm
servicemesh-proxy-debugsource-2.1.3-1.el8.s390x.rpm
servicemesh-ratelimit-2.1.3-1.el8.s390x.rpm
x86_64:
servicemesh-2.1.3-1.el8.x86_64.rpm
servicemesh-cni-2.1.3-1.el8.x86_64.rpm
servicemesh-operator-2.1.3-2.el8.x86_64.rpm
servicemesh-pilot-agent-2.1.3-1.el8.x86_64.rpm
servicemesh-pilot-discovery-2.1.3-1.el8.x86_64.rpm
servicemesh-prometheus-2.23.0-7.el8.x86_64.rpm
servicemesh-proxy-2.1.3-1.el8.x86_64.rpm
servicemesh-proxy-debuginfo-2.1.3-1.el8.x86_64.rpm
servicemesh-proxy-debugsource-2.1.3-1.el8.x86_64.rpm
servicemesh-ratelimit-2.1.3-1.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
Red Hat OpenShift Service Mesh 2.1.3 has been released.Red Hat Product Security has rated this update as having a security impactof Critical. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
OpenShift Service Mesh 2.1 - noarch, ppc64le, s390x, x86_64
Bugs Fixed
2053429 - CVE-2022-23806 golang: crypto/elliptic IsOnCurve returns true for invalid field elements
2053532 - CVE-2022-23772 golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString
2053541 - CVE-2022-23773 golang: cmd/go: misinterpretation of branch names can lead to incorrect access control
2088737 - CVE-2022-29225 envoy: Decompressors can be zip bombed
2088738 - CVE-2022-29224 envoy: Segfault in GrpcHealthCheckerImpl
2088739 - CVE-2022-29226 envoy: oauth filter allows trivial bypass
2088740 - CVE-2022-29228 envoy: oauth filter calls continueDecoding() from within decodeHeaders()
2088819 - CVE-2022-31045 Istio: Unsafe memory access in metadata exchange.
6. JIRA issues fixed (https://issues.redhat.com/):
OSSM-1107 - Take jwksResolverExtraRootCA out of TechPreview
OSSM-1614 - RPM Release for Maistra 2.1.3