Lucene search

K
redhatRedHatRHSA-2022:1275
HistoryApr 07, 2022 - 5:30 p.m.

(RHSA-2022:1275) Important: Red Hat OpenShift Service Mesh 2.1.2 security update

2022-04-0717:30:35
access.redhat.com
71
red hat openshift
service mesh
istio
security update
rpm packages
cve-2022-21654
cve-2022-21655
cve-2022-24726
cve-2021-43824
cve-2021-43825
cve-2021-43826
cve-2022-23606
cve-2022-23635
cvss score

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

59.4%

Red Hat OpenShift Service Mesh is Red Hat’s distribution of the Istio service
mesh project, tailored for installation into an on-premise OpenShift Container
Platform installation.

This advisory covers the RPM packages for the release.

Security Fix(es):

  • envoy: Incorrect configuration handling allows mTLS session re-use without re-validation (CVE-2022-21654)

  • envoy: Incorrect handling of internal redirects to routes with a direct response entry (CVE-2022-21655)

  • istio: Unauthenticated control plane denial of service attack due to stack exhaustion (CVE-2022-24726)

  • envoy: Null pointer dereference when using JWT filter safe_regex match (CVE-2021-43824)

  • envoy: Use-after-free when response filters increase response data (CVE-2021-43825)

  • envoy: Use-after-free when tunneling TCP over HTTP (CVE-2021-43826)

  • envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service (CVE-2022-23606)

  • istio: unauthenticated control plane denial of service attack (CVE-2022-23635)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

59.4%