Critical: Red Hat OpenShift Service Mesh 2.1.3 security update

Synopsis

Critical: Red Hat OpenShift Service Mesh 2.1.3 security update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Red Hat OpenShift Service Mesh 2.1.3 has been released.

Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Service Mesh is a Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.

This advisory covers the RPM packages for the release.

Security Fix(es):

  • envoy: oauth filter allows trivial bypass (CVE-2022-29226)
  • envoy: Decompressors can be zip bombed (CVE-2022-29225)
  • envoy: oauth filter calls continueDecoding() from within decodeHeaders() (CVE-2022-29228)
  • golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)
  • golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)
  • golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806)
  • envoy: Segfault in GrpcHealthCheckerImpl (CVE-2022-29224)
  • Istio: Unsafe memory access in metadata exchange (CVE-2022-31045)

For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, see the CVE page listed in the References section.

Solution

The OpenShift Service Mesh Release Notes provide information on the features and known issues. See the link in the References section.

Affected Products

  • Red Hat OpenShift Service Mesh 2.1 for RHEL 8 x86_64
  • Red Hat OpenShift Service Mesh for Power 2.1 for RHEL 8 ppc64le
  • Red Hat OpenShift Service Mesh for IBM Z 2.1 for RHEL 8 s390x

Fixes

  • BZ - 2053429 - CVE-2022-23806 golang: crypto/elliptic IsOnCurve returns true for invalid field elements
  • BZ - 2053532 - CVE-2022-23772 golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString
  • BZ - 2053541 - CVE-2022-23773 golang: cmd/go: misinterpretation of branch names can lead to incorrect access control
  • BZ - 2088737 - CVE-2022-29225 envoy: Decompressors can be zip bombed
  • BZ - 2088738 - CVE-2022-29224 envoy: Segfault in GrpcHealthCheckerImpl
  • BZ - 2088739 - CVE-2022-29226 envoy: oauth filter allows trivial bypass
  • BZ - 2088740 - CVE-2022-29228 envoy: oauth filter calls continueDecoding() from within decodeHeaders()
  • BZ - 2088819 - CVE-2022-31045 Istio: Unsafe memory access in metadata exchange.
  • OSSM-1614 - RPM Release for Maistra 2.1.3
  • OSSM-1107 - Take jwksResolverExtraRootCA out of TechPreview