[RHSA-2023:5174-01] Moderate: Red Hat OpenShift Service Mesh Containers for 2.4.3 security update

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Thu Sep 14 21:27:11 UTC 2023


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat OpenShift Service Mesh Containers for 2.4.3 security update
Advisory ID:       RHSA-2023:5174-01
Product:           Red Hat OpenShift Service Mesh
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:5174
Issue date:        2023-09-14
CVE Names:         CVE-2016-3709 CVE-2023-2602 CVE-2023-2603 
                   CVE-2023-2828 CVE-2023-3899 CVE-2023-27536 
                   CVE-2023-28321 CVE-2023-28484 CVE-2023-29469 
                   CVE-2023-32681 CVE-2023-34969 CVE-2023-35942 
=====================================================================

1. Summary:

Red Hat OpenShift Service Mesh Containers for 2.4.3

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio
service mesh project, tailored for installation into an on-premise
OpenShift Container Platform installation.

This advisory covers container images for the release.

Security Fix(es):

* envoy: gRPC access log crash caused by the listener draining
(CVE-2023-35942)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2217978 - CVE-2023-35942 envoy: gRPC access log crash caused by the listener draining

5. JIRA issues fixed (https://issues.redhat.com/):

OSSM-1182 - Deliver ARM images for OSSM Operator for Developer Preview
OSSM-3508 - Ensure Cluster Ingress Operator can create cluster-wide SMCP
OSSM-3979 - Implement envoyExtAuthzGrpc extension provider
OSSM-4247 - Service details of ServiceEntry fails
OSSM-4461 - Add FIPS annotation setting to kiali operator metadata 
OSSM-4491 - Add missing configuration options to meshConfig.extensionProviders.envoyExtAuthzHttp
OSSM-4559 - Panic in conversion of extensionProviders.envoyExtAuthzHttp
OSSM-4627 - Add option to disable the GatewayClass controller
OSSM-4705 - Removing subset in config - Fails to save

6. References:

https://access.redhat.com/security/cve/CVE-2016-3709
https://access.redhat.com/security/cve/CVE-2023-2602
https://access.redhat.com/security/cve/CVE-2023-2603
https://access.redhat.com/security/cve/CVE-2023-2828
https://access.redhat.com/security/cve/CVE-2023-3899
https://access.redhat.com/security/cve/CVE-2023-27536
https://access.redhat.com/security/cve/CVE-2023-28321
https://access.redhat.com/security/cve/CVE-2023-28484
https://access.redhat.com/security/cve/CVE-2023-29469
https://access.redhat.com/security/cve/CVE-2023-32681
https://access.redhat.com/security/cve/CVE-2023-34969
https://access.redhat.com/security/cve/CVE-2023-35942
https://access.redhat.com/security/updates/classification/#moderate

7. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=EENm
-----END PGP SIGNATURE-----


More information about the RHSA-announce mailing list