RedHat: RHSA-2022-6277:01 Moderate: Red Hat OpenShift Service Mesh ...
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat OpenShift Service Mesh 2.1.5 security update
Advisory ID:       RHSA-2022:6277-01
Product:           Red Hat OpenShift Service Mesh
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:6277
Issue date:        2022-08-31
CVE Names:         CVE-2022-24675 CVE-2022-24785 CVE-2022-24921 
                   CVE-2022-28327 CVE-2022-29526 CVE-2022-30629 
                   CVE-2022-31129 
=====================================================================

1. Summary:

Red Hat OpenShift Service Mesh 2.1.5

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

OpenShift Service Mesh 2.1 - noarch, ppc64le, s390x, x86_64

3. Description:

Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio
service mesh project, tailored for installation into an OpenShift Container
Platform installation.

This advisory covers the RPM packages for the release.

Security Fix(es):

* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* moment: Moment.js: Path traversal in moment.locale (CVE-2022-24785)
* golang: regexp: stack exhaustion via a deeply nested expression
(CVE-2022-24921)
* golang: crypto/elliptic: panic caused by oversized scalar
(CVE-2022-28327)
* golang: syscall: faccessat checks wrong group (CVE-2022-29526)
* golang: crypto/tls: session tickets lack random ticket_age_add
(CVE-2022-30629)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

The OpenShift Service Mesh Release Notes provide information on the
features and known issues:

https://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html

5. Bugs fixed (https://bugzilla.redhat.com/):

2064857 - CVE-2022-24921 golang: regexp: stack exhaustion via a deeply nested expression
2072009 - CVE-2022-24785 Moment.js: Path traversal  in moment.locale
2077688 - CVE-2022-24675 golang: encoding/pem: fix stack overflow in Decode
2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar
2084085 - CVE-2022-29526 golang: syscall: faccessat checks wrong group
2092793 - CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add
2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS

6. Package List:

OpenShift Service Mesh 2.1:

Source:
servicemesh-2.1.5-1.el8.src.rpm
servicemesh-operator-2.1.5-1.el8.src.rpm
servicemesh-prometheus-2.23.0-9.el8.src.rpm
servicemesh-proxy-2.1.5-1.el8.src.rpm
servicemesh-ratelimit-2.1.5-1.el8.src.rpm

noarch:
servicemesh-proxy-wasm-2.1.5-1.el8.noarch.rpm

ppc64le:
servicemesh-2.1.5-1.el8.ppc64le.rpm
servicemesh-cni-2.1.5-1.el8.ppc64le.rpm
servicemesh-operator-2.1.5-1.el8.ppc64le.rpm
servicemesh-pilot-agent-2.1.5-1.el8.ppc64le.rpm
servicemesh-pilot-discovery-2.1.5-1.el8.ppc64le.rpm
servicemesh-prometheus-2.23.0-9.el8.ppc64le.rpm
servicemesh-proxy-2.1.5-1.el8.ppc64le.rpm
servicemesh-proxy-debuginfo-2.1.5-1.el8.ppc64le.rpm
servicemesh-proxy-debugsource-2.1.5-1.el8.ppc64le.rpm
servicemesh-ratelimit-2.1.5-1.el8.ppc64le.rpm

s390x:
servicemesh-2.1.5-1.el8.s390x.rpm
servicemesh-cni-2.1.5-1.el8.s390x.rpm
servicemesh-operator-2.1.5-1.el8.s390x.rpm
servicemesh-pilot-agent-2.1.5-1.el8.s390x.rpm
servicemesh-pilot-discovery-2.1.5-1.el8.s390x.rpm
servicemesh-prometheus-2.23.0-9.el8.s390x.rpm
servicemesh-proxy-2.1.5-1.el8.s390x.rpm
servicemesh-proxy-debuginfo-2.1.5-1.el8.s390x.rpm
servicemesh-proxy-debugsource-2.1.5-1.el8.s390x.rpm
servicemesh-ratelimit-2.1.5-1.el8.s390x.rpm

x86_64:
servicemesh-2.1.5-1.el8.x86_64.rpm
servicemesh-cni-2.1.5-1.el8.x86_64.rpm
servicemesh-operator-2.1.5-1.el8.x86_64.rpm
servicemesh-pilot-agent-2.1.5-1.el8.x86_64.rpm
servicemesh-pilot-discovery-2.1.5-1.el8.x86_64.rpm
servicemesh-prometheus-2.23.0-9.el8.x86_64.rpm
servicemesh-proxy-2.1.5-1.el8.x86_64.rpm
servicemesh-proxy-debuginfo-2.1.5-1.el8.x86_64.rpm
servicemesh-proxy-debugsource-2.1.5-1.el8.x86_64.rpm
servicemesh-ratelimit-2.1.5-1.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-24675
https://access.redhat.com/security/cve/CVE-2022-24785
https://access.redhat.com/security/cve/CVE-2022-24921
https://access.redhat.com/security/cve/CVE-2022-28327
https://access.redhat.com/security/cve/CVE-2022-29526
https://access.redhat.com/security/cve/CVE-2022-30629
https://access.redhat.com/security/cve/CVE-2022-31129
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=QTJn
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-6277:01 Moderate: Red Hat OpenShift Service Mesh 2.1.5

Red Hat OpenShift Service Mesh 2.1.5 Red Hat Product Security has rated this update as having a security impact of Moderate

Summary

Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation.
This advisory covers the RPM packages for the release.
Security Fix(es):
* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129) * golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675) * moment: Moment.js: Path traversal in moment.locale (CVE-2022-24785) * golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921) * golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327) * golang: syscall: faccessat checks wrong group (CVE-2022-29526) * golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

The OpenShift Service Mesh Release Notes provide information on thefeatures and known issues:https://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html

References

https://access.redhat.com/security/cve/CVE-2022-24675 https://access.redhat.com/security/cve/CVE-2022-24785 https://access.redhat.com/security/cve/CVE-2022-24921 https://access.redhat.com/security/cve/CVE-2022-28327 https://access.redhat.com/security/cve/CVE-2022-29526 https://access.redhat.com/security/cve/CVE-2022-30629 https://access.redhat.com/security/cve/CVE-2022-31129 https://access.redhat.com/security/updates/classification/#moderate

Package List

OpenShift Service Mesh 2.1:
Source: servicemesh-2.1.5-1.el8.src.rpm servicemesh-operator-2.1.5-1.el8.src.rpm servicemesh-prometheus-2.23.0-9.el8.src.rpm servicemesh-proxy-2.1.5-1.el8.src.rpm servicemesh-ratelimit-2.1.5-1.el8.src.rpm
noarch: servicemesh-proxy-wasm-2.1.5-1.el8.noarch.rpm
ppc64le: servicemesh-2.1.5-1.el8.ppc64le.rpm servicemesh-cni-2.1.5-1.el8.ppc64le.rpm servicemesh-operator-2.1.5-1.el8.ppc64le.rpm servicemesh-pilot-agent-2.1.5-1.el8.ppc64le.rpm servicemesh-pilot-discovery-2.1.5-1.el8.ppc64le.rpm servicemesh-prometheus-2.23.0-9.el8.ppc64le.rpm servicemesh-proxy-2.1.5-1.el8.ppc64le.rpm servicemesh-proxy-debuginfo-2.1.5-1.el8.ppc64le.rpm servicemesh-proxy-debugsource-2.1.5-1.el8.ppc64le.rpm servicemesh-ratelimit-2.1.5-1.el8.ppc64le.rpm
s390x: servicemesh-2.1.5-1.el8.s390x.rpm servicemesh-cni-2.1.5-1.el8.s390x.rpm servicemesh-operator-2.1.5-1.el8.s390x.rpm servicemesh-pilot-agent-2.1.5-1.el8.s390x.rpm servicemesh-pilot-discovery-2.1.5-1.el8.s390x.rpm servicemesh-prometheus-2.23.0-9.el8.s390x.rpm servicemesh-proxy-2.1.5-1.el8.s390x.rpm servicemesh-proxy-debuginfo-2.1.5-1.el8.s390x.rpm servicemesh-proxy-debugsource-2.1.5-1.el8.s390x.rpm servicemesh-ratelimit-2.1.5-1.el8.s390x.rpm
x86_64: servicemesh-2.1.5-1.el8.x86_64.rpm servicemesh-cni-2.1.5-1.el8.x86_64.rpm servicemesh-operator-2.1.5-1.el8.x86_64.rpm servicemesh-pilot-agent-2.1.5-1.el8.x86_64.rpm servicemesh-pilot-discovery-2.1.5-1.el8.x86_64.rpm servicemesh-prometheus-2.23.0-9.el8.x86_64.rpm servicemesh-proxy-2.1.5-1.el8.x86_64.rpm servicemesh-proxy-debuginfo-2.1.5-1.el8.x86_64.rpm servicemesh-proxy-debugsource-2.1.5-1.el8.x86_64.rpm servicemesh-ratelimit-2.1.5-1.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

Severity
Advisory ID: RHSA-2022:6277-01
Product: Red Hat OpenShift Service Mesh
Advisory URL: https://access.redhat.com/errata/RHSA-2022:6277
Issued Date: : 2022-08-31
CVE Names: CVE-2022-24675 CVE-2022-24785 CVE-2022-24921 CVE-2022-28327 CVE-2022-29526 CVE-2022-30629 CVE-2022-31129

Topic

Red Hat OpenShift Service Mesh 2.1.5Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.

Relevant Releases Architectures

OpenShift Service Mesh 2.1 - noarch, ppc64le, s390x, x86_64

Bugs Fixed

2064857 - CVE-2022-24921 golang: regexp: stack exhaustion via a deeply nested expression

2072009 - CVE-2022-24785 Moment.js: Path traversal in moment.locale

2077688 - CVE-2022-24675 golang: encoding/pem: fix stack overflow in Decode

2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar

2084085 - CVE-2022-29526 golang: syscall: faccessat checks wrong group

2092793 - CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add

2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.