-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat OpenShift Service Mesh Containers for 2.4.3 security update
Advisory ID:       RHSA-2023:5174-01
Product:           Red Hat OpenShift Service Mesh
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:5174
Issue date:        2023-09-14
CVE Names:         CVE-2016-3709 CVE-2023-2602 CVE-2023-2603 
                   CVE-2023-2828 CVE-2023-3899 CVE-2023-27536 
                   CVE-2023-28321 CVE-2023-28484 CVE-2023-29469 
                   CVE-2023-32681 CVE-2023-34969 CVE-2023-35942 
=====================================================================

1. Summary:

Red Hat OpenShift Service Mesh Containers for 2.4.3

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio
service mesh project, tailored for installation into an on-premise
OpenShift Container Platform installation.

This advisory covers container images for the release.

Security Fix(es):

* envoy: gRPC access log crash caused by the listener draining
(CVE-2023-35942)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2217978 - CVE-2023-35942 envoy: gRPC access log crash caused by the listener draining

5. JIRA issues fixed (https://issues.redhat.com/):

OSSM-1182 - Deliver ARM images for OSSM Operator for Developer Preview
OSSM-3508 - Ensure Cluster Ingress Operator can create cluster-wide SMCP
OSSM-3979 - Implement envoyExtAuthzGrpc extension provider
OSSM-4247 - Service details of ServiceEntry fails
OSSM-4461 - Add FIPS annotation setting to kiali operator metadata 
OSSM-4491 - Add missing configuration options to meshConfig.extensionProviders.envoyExtAuthzHttp
OSSM-4559 - Panic in conversion of extensionProviders.envoyExtAuthzHttp
OSSM-4627 - Add option to disable the GatewayClass controller
OSSM-4705 - Removing subset in config - Fails to save

6. References:

https://access.redhat.com/security/cve/CVE-2016-3709
https://access.redhat.com/security/cve/CVE-2023-2602
https://access.redhat.com/security/cve/CVE-2023-2603
https://access.redhat.com/security/cve/CVE-2023-2828
https://access.redhat.com/security/cve/CVE-2023-3899
https://access.redhat.com/security/cve/CVE-2023-27536
https://access.redhat.com/security/cve/CVE-2023-28321
https://access.redhat.com/security/cve/CVE-2023-28484
https://access.redhat.com/security/cve/CVE-2023-29469
https://access.redhat.com/security/cve/CVE-2023-32681
https://access.redhat.com/security/cve/CVE-2023-34969
https://access.redhat.com/security/cve/CVE-2023-35942
https://access.redhat.com/security/updates/classification/#moderate

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=EENm
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-5174:01 Moderate: Red Hat OpenShift Service Mesh

Red Hat OpenShift Service Mesh Containers for 2.4.3 Red Hat Product Security has rated this update as having a security impact of Moderate

Summary

Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
This advisory covers container images for the release.
Security Fix(es):
* envoy: gRPC access log crash caused by the listener draining (CVE-2023-35942)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2016-3709 https://access.redhat.com/security/cve/CVE-2023-2602 https://access.redhat.com/security/cve/CVE-2023-2603 https://access.redhat.com/security/cve/CVE-2023-2828 https://access.redhat.com/security/cve/CVE-2023-3899 https://access.redhat.com/security/cve/CVE-2023-27536 https://access.redhat.com/security/cve/CVE-2023-28321 https://access.redhat.com/security/cve/CVE-2023-28484 https://access.redhat.com/security/cve/CVE-2023-29469 https://access.redhat.com/security/cve/CVE-2023-32681 https://access.redhat.com/security/cve/CVE-2023-34969 https://access.redhat.com/security/cve/CVE-2023-35942 https://access.redhat.com/security/updates/classification/#moderate

Package List


Severity
Advisory ID: RHSA-2023:5174-01
Product: Red Hat OpenShift Service Mesh
Advisory URL: https://access.redhat.com/errata/RHSA-2023:5174
Issued Date: : 2023-09-14
CVE Names: CVE-2016-3709 CVE-2023-2602 CVE-2023-2603 CVE-2023-2828 CVE-2023-3899 CVE-2023-27536 CVE-2023-28321 CVE-2023-28484 CVE-2023-29469 CVE-2023-32681 CVE-2023-34969 CVE-2023-35942

Topic

Red Hat OpenShift Service Mesh Containers for 2.4.3Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2217978 - CVE-2023-35942 envoy: gRPC access log crash caused by the listener draining

5. JIRA issues fixed (https://issues.redhat.com/):

OSSM-1182 - Deliver ARM images for OSSM Operator for Developer Preview

OSSM-3508 - Ensure Cluster Ingress Operator can create cluster-wide SMCP

OSSM-3979 - Implement envoyExtAuthzGrpc extension provider

OSSM-4247 - Service details of ServiceEntry fails

OSSM-4461 - Add FIPS annotation setting to kiali operator metadata

OSSM-4491 - Add missing configuration options to meshConfig.extensionProviders.envoyExtAuthzHttp

OSSM-4559 - Panic in conversion of extensionProviders.envoyExtAuthzHttp

OSSM-4627 - Add option to disable the GatewayClass controller

OSSM-4705 - Removing subset in config - Fails to save


Related News