Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2019-14993
Vulnerability from cvelistv5
Published
2019-08-13 17:38
Modified
2024-08-05 00:34
Severity ?
EPSS score ?
Summary
Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383 | Vendor Advisory | |
cve@mitre.org | https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164 | Exploit, Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://github.com/envoyproxy/envoy/issues/7728 | Exploit, Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://istio.io/blog/2019/istio-security-003-004/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/envoyproxy/envoy/issues/7728 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://istio.io/blog/2019/istio-security-003-004/ | Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:53.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/envoyproxy/envoy/issues/7728" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://istio.io/blog/2019/istio-security-003-004/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-13T17:38:39", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/envoyproxy/envoy/issues/7728" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://istio.io/blog/2019/istio-security-003-004/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383", "refsource": "MISC", "url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383" }, { "name": "https://github.com/envoyproxy/envoy/issues/7728", "refsource": "MISC", "url": "https://github.com/envoyproxy/envoy/issues/7728" }, { "name": "https://istio.io/blog/2019/istio-security-003-004/", "refsource": "CONFIRM", "url": "https://istio.io/blog/2019/istio-security-003-004/" }, { "name": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164", "refsource": "MISC", "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14993", "datePublished": "2019-08-13T17:38:39", "dateReserved": "2019-08-13T00:00:00", "dateUpdated": "2024-08-05T00:34:53.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-14993\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-08-13T18:15:13.117\",\"lastModified\":\"2024-11-21T04:27:50.113\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.\"},{\"lang\":\"es\",\"value\":\"Istio antes de 1.1.13 y 1.2.x antes de 1.2.4 maneja mal las expresiones regulares para URI largos, lo que lleva a una denegaci\u00f3n de servicio durante el uso de la API JWT, VirtualService, HTTPAPISpecBinding o QuotaSpecBinding.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-185\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.13\",\"matchCriteriaId\":\"20977A28-2513-4FD5-9673-AAA6D9EC8F9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.2.0\",\"versionEndExcluding\":\"1.2.4\",\"matchCriteriaId\":\"FA158720-95C9-40E5-B5E6-D9243ADCC3C2\"}]}]}],\"references\":[{\"url\":\"https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/envoyproxy/envoy/issues/7728\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://istio.io/blog/2019/istio-security-003-004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/envoyproxy/envoy/issues/7728\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://istio.io/blog/2019/istio-security-003-004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
RHEA-2020:1416
Vulnerability from csaf_redhat
Published
2020-04-08 21:46
Modified
2024-11-22 14:43
Summary
Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs
Notes
Topic
Red Hat OpenShift Service Mesh 1.1.0.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
The OpenShift Service Mesh release notes provide information on the features and known issues:
https://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html
This advisory covers the RPM packages for the release.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Service Mesh 1.1.0.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html\n\nThis advisory covers the RPM packages for the release.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHEA-2020:1416", "url": "https://access.redhat.com/errata/RHEA-2020:1416" }, { "category": "external", "summary": "MAISTRA-907", "url": "https://issues.redhat.com/browse/MAISTRA-907" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhea-2020_1416.json" } ], "title": "Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs", "tracking": { "current_release_date": "2024-11-22T14:43:46+00:00", "generator": { "date": "2024-11-22T14:43:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHEA-2020:1416", "initial_release_date": "2020-04-08T21:46:21+00:00", "revision_history": [ { "date": "2020-04-08T21:46:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-08T21:46:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:43:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 1.1", "product": { "name": "OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Service Mesh 1.1", "product": { "name": "Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product": { "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product_id": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ior-0:1.1.0-3.el8.x86_64", "product": { "name": "ior-0:1.1.0-3.el8.x86_64", "product_id": "ior-0:1.1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product_id": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product": { "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product_id": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product": { "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product_id": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product": { "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product_id": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-citadel@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-galley@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-sidecar-injector@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product": { "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product_id": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product": { "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product_id": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:1.1.0-3.el8.src", "product": { "name": "servicemesh-cni-0:1.1.0-3.el8.src", "product_id": "servicemesh-cni-0:1.1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "ior-0:1.1.0-3.el8.src", "product": { "name": "ior-0:1.1.0-3.el8.src", "product_id": "ior-0:1.1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product_id": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-2.el8.src", "product": { "name": "servicemesh-grafana-0:6.4.3-2.el8.src", "product_id": "servicemesh-grafana-0:6.4.3-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:1.1.0-4.el8.src", "product": { "name": "servicemesh-proxy-0:1.1.0-4.el8.src", "product_id": "servicemesh-proxy-0:1.1.0-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.0-5.el8.src", "product": { "name": "servicemesh-0:1.1.0-5.el8.src", "product_id": "servicemesh-0:1.1.0-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.0-9.el8.src", "product": { "name": "servicemesh-operator-0:1.1.0-9.el8.src", "product_id": "servicemesh-operator-0:1.1.0-9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=src" } } }, { "category": "product_version", "name": "kiali-0:v1.12.7.redhat1-1.el7.src", "product": { "name": "kiali-0:v1.12.7.redhat1-1.el7.src", "product_id": "kiali-0:v1.12.7.redhat1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.7.redhat1-1.el7.src as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src" }, "product_reference": "kiali-0:v1.12.7.redhat1-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64 as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64" }, "product_reference": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src" }, "product_reference": "ior-0:1.1.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64" }, "product_reference": "ior-0:1.1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.0-5.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src" }, "product_reference": "servicemesh-0:1.1.0-5.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src" }, "product_reference": "servicemesh-cni-0:1.1.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64" }, "product_reference": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-2.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src" }, "product_reference": "servicemesh-grafana-0:6.4.3-2.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64" }, "product_reference": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64" }, "product_reference": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.0-9.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src" }, "product_reference": "servicemesh-operator-0:1.1.0-9.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64" }, "product_reference": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src" }, "product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64" }, "product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.0-4.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src" }, "product_reference": "servicemesh-proxy-0:1.1.0-4.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64" }, "product_reference": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14993", "cwe": { "id": "CWE-185", "name": "Incorrect Regular Expression" }, "discovery_date": "2019-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1759816" } ], "notes": [ { "category": "description", "text": "A flaw was found in Istio in versions prior to 1.1.13 and 1.2.4. Regular expressions for long URIs are mishandled leading to a denial of service during the use of JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "istio/envoy: mishandling regular expressions for long URIs leading to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14993" }, { "category": "external", "summary": "RHBZ#1759816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759816" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14993", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993" }, { "category": "external", "summary": "https://istio.io/news/2019/istio-security-003-004/", "url": "https://istio.io/news/2019/istio-security-003-004/" } ], "release_date": "2019-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-08T21:46:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2020:1416" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "istio/envoy: mishandling regular expressions for long URIs leading to DoS" }, { "cve": "CVE-2019-15225", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1765655" } ], "notes": [ { "category": "description", "text": "A flaw was found in Envoy through version 1.11.1. Users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: crafted request with long URI allows remote attacker to cause denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15225" }, { "category": "external", "summary": "RHBZ#1765655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15225", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225" } ], "release_date": "2019-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-08T21:46:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2020:1416" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "envoy: crafted request with long URI allows remote attacker to cause denial of service" } ] }
rhea-2020_1416
Vulnerability from csaf_redhat
Published
2020-04-08 21:46
Modified
2024-11-22 14:43
Summary
Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs
Notes
Topic
Red Hat OpenShift Service Mesh 1.1.0.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
The OpenShift Service Mesh release notes provide information on the features and known issues:
https://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html
This advisory covers the RPM packages for the release.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Service Mesh 1.1.0.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html\n\nThis advisory covers the RPM packages for the release.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHEA-2020:1416", "url": "https://access.redhat.com/errata/RHEA-2020:1416" }, { "category": "external", "summary": "MAISTRA-907", "url": "https://issues.redhat.com/browse/MAISTRA-907" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhea-2020_1416.json" } ], "title": "Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs", "tracking": { "current_release_date": "2024-11-22T14:43:46+00:00", "generator": { "date": "2024-11-22T14:43:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHEA-2020:1416", "initial_release_date": "2020-04-08T21:46:21+00:00", "revision_history": [ { "date": "2020-04-08T21:46:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-08T21:46:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:43:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 1.1", "product": { "name": "OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Service Mesh 1.1", "product": { "name": "Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product": { "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product_id": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ior-0:1.1.0-3.el8.x86_64", "product": { "name": "ior-0:1.1.0-3.el8.x86_64", "product_id": "ior-0:1.1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product_id": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product": { "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product_id": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product": { "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product_id": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product": { "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product_id": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-citadel@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-galley@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-sidecar-injector@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product": { "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product_id": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product": { "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product_id": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:1.1.0-3.el8.src", "product": { "name": "servicemesh-cni-0:1.1.0-3.el8.src", "product_id": "servicemesh-cni-0:1.1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "ior-0:1.1.0-3.el8.src", "product": { "name": "ior-0:1.1.0-3.el8.src", "product_id": "ior-0:1.1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product_id": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-2.el8.src", "product": { "name": "servicemesh-grafana-0:6.4.3-2.el8.src", "product_id": "servicemesh-grafana-0:6.4.3-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:1.1.0-4.el8.src", "product": { "name": "servicemesh-proxy-0:1.1.0-4.el8.src", "product_id": "servicemesh-proxy-0:1.1.0-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.0-5.el8.src", "product": { "name": "servicemesh-0:1.1.0-5.el8.src", "product_id": "servicemesh-0:1.1.0-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.0-9.el8.src", "product": { "name": "servicemesh-operator-0:1.1.0-9.el8.src", "product_id": "servicemesh-operator-0:1.1.0-9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=src" } } }, { "category": "product_version", "name": "kiali-0:v1.12.7.redhat1-1.el7.src", "product": { "name": "kiali-0:v1.12.7.redhat1-1.el7.src", "product_id": "kiali-0:v1.12.7.redhat1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.7.redhat1-1.el7.src as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src" }, "product_reference": "kiali-0:v1.12.7.redhat1-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64 as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64" }, "product_reference": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src" }, "product_reference": "ior-0:1.1.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64" }, "product_reference": "ior-0:1.1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.0-5.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src" }, "product_reference": "servicemesh-0:1.1.0-5.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src" }, "product_reference": "servicemesh-cni-0:1.1.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64" }, "product_reference": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-2.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src" }, "product_reference": "servicemesh-grafana-0:6.4.3-2.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64" }, "product_reference": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64" }, "product_reference": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.0-9.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src" }, "product_reference": "servicemesh-operator-0:1.1.0-9.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64" }, "product_reference": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src" }, "product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64" }, "product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.0-4.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src" }, "product_reference": "servicemesh-proxy-0:1.1.0-4.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64" }, "product_reference": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14993", "cwe": { "id": "CWE-185", "name": "Incorrect Regular Expression" }, "discovery_date": "2019-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1759816" } ], "notes": [ { "category": "description", "text": "A flaw was found in Istio in versions prior to 1.1.13 and 1.2.4. Regular expressions for long URIs are mishandled leading to a denial of service during the use of JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "istio/envoy: mishandling regular expressions for long URIs leading to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14993" }, { "category": "external", "summary": "RHBZ#1759816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759816" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14993", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993" }, { "category": "external", "summary": "https://istio.io/news/2019/istio-security-003-004/", "url": "https://istio.io/news/2019/istio-security-003-004/" } ], "release_date": "2019-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-08T21:46:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2020:1416" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "istio/envoy: mishandling regular expressions for long URIs leading to DoS" }, { "cve": "CVE-2019-15225", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1765655" } ], "notes": [ { "category": "description", "text": "A flaw was found in Envoy through version 1.11.1. Users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: crafted request with long URI allows remote attacker to cause denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15225" }, { "category": "external", "summary": "RHBZ#1765655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15225", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225" } ], "release_date": "2019-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-08T21:46:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2020:1416" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "envoy: crafted request with long URI allows remote attacker to cause denial of service" } ] }
rhea-2020:1416
Vulnerability from csaf_redhat
Published
2020-04-08 21:46
Modified
2024-11-22 14:43
Summary
Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs
Notes
Topic
Red Hat OpenShift Service Mesh 1.1.0.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
The OpenShift Service Mesh release notes provide information on the features and known issues:
https://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html
This advisory covers the RPM packages for the release.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Service Mesh 1.1.0.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html\n\nThis advisory covers the RPM packages for the release.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHEA-2020:1416", "url": "https://access.redhat.com/errata/RHEA-2020:1416" }, { "category": "external", "summary": "MAISTRA-907", "url": "https://issues.redhat.com/browse/MAISTRA-907" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhea-2020_1416.json" } ], "title": "Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs", "tracking": { "current_release_date": "2024-11-22T14:43:46+00:00", "generator": { "date": "2024-11-22T14:43:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHEA-2020:1416", "initial_release_date": "2020-04-08T21:46:21+00:00", "revision_history": [ { "date": "2020-04-08T21:46:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-08T21:46:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:43:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 1.1", "product": { "name": "OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Service Mesh 1.1", "product": { "name": "Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product": { "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product_id": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ior-0:1.1.0-3.el8.x86_64", "product": { "name": "ior-0:1.1.0-3.el8.x86_64", "product_id": "ior-0:1.1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product_id": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product": { "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product_id": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product": { "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product_id": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product": { "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product_id": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-citadel@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-galley@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-sidecar-injector@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product": { "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product_id": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product": { "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product_id": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:1.1.0-3.el8.src", "product": { "name": "servicemesh-cni-0:1.1.0-3.el8.src", "product_id": "servicemesh-cni-0:1.1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "ior-0:1.1.0-3.el8.src", "product": { "name": "ior-0:1.1.0-3.el8.src", "product_id": "ior-0:1.1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product_id": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-2.el8.src", "product": { "name": "servicemesh-grafana-0:6.4.3-2.el8.src", "product_id": "servicemesh-grafana-0:6.4.3-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:1.1.0-4.el8.src", "product": { "name": "servicemesh-proxy-0:1.1.0-4.el8.src", "product_id": "servicemesh-proxy-0:1.1.0-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.0-5.el8.src", "product": { "name": "servicemesh-0:1.1.0-5.el8.src", "product_id": "servicemesh-0:1.1.0-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.0-9.el8.src", "product": { "name": "servicemesh-operator-0:1.1.0-9.el8.src", "product_id": "servicemesh-operator-0:1.1.0-9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=src" } } }, { "category": "product_version", "name": "kiali-0:v1.12.7.redhat1-1.el7.src", "product": { "name": "kiali-0:v1.12.7.redhat1-1.el7.src", "product_id": "kiali-0:v1.12.7.redhat1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.7.redhat1-1.el7.src as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src" }, "product_reference": "kiali-0:v1.12.7.redhat1-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64 as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64" }, "product_reference": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src" }, "product_reference": "ior-0:1.1.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64" }, "product_reference": "ior-0:1.1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.0-5.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src" }, "product_reference": "servicemesh-0:1.1.0-5.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src" }, "product_reference": "servicemesh-cni-0:1.1.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64" }, "product_reference": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-2.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src" }, "product_reference": "servicemesh-grafana-0:6.4.3-2.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64" }, "product_reference": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64" }, "product_reference": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.0-9.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src" }, "product_reference": "servicemesh-operator-0:1.1.0-9.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64" }, "product_reference": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src" }, "product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64" }, "product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.0-4.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src" }, "product_reference": "servicemesh-proxy-0:1.1.0-4.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64" }, "product_reference": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14993", "cwe": { "id": "CWE-185", "name": "Incorrect Regular Expression" }, "discovery_date": "2019-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1759816" } ], "notes": [ { "category": "description", "text": "A flaw was found in Istio in versions prior to 1.1.13 and 1.2.4. Regular expressions for long URIs are mishandled leading to a denial of service during the use of JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "istio/envoy: mishandling regular expressions for long URIs leading to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14993" }, { "category": "external", "summary": "RHBZ#1759816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759816" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14993", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993" }, { "category": "external", "summary": "https://istio.io/news/2019/istio-security-003-004/", "url": "https://istio.io/news/2019/istio-security-003-004/" } ], "release_date": "2019-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-08T21:46:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2020:1416" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "istio/envoy: mishandling regular expressions for long URIs leading to DoS" }, { "cve": "CVE-2019-15225", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1765655" } ], "notes": [ { "category": "description", "text": "A flaw was found in Envoy through version 1.11.1. Users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: crafted request with long URI allows remote attacker to cause denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15225" }, { "category": "external", "summary": "RHBZ#1765655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15225", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225" } ], "release_date": "2019-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-08T21:46:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2020:1416" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "envoy: crafted request with long URI allows remote attacker to cause denial of service" } ] }
ghsa-qcvw-82hh-gq38
Vulnerability from github
Published
2022-05-24 16:53
Modified
2023-07-17 21:05
Severity ?
Summary
Istio ReDoS Vulnerability
Details
Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "istio.io/istio" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.1.13" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "istio.io/istio" }, "ranges": [ { "events": [ { "introduced": "1.2.0" }, { "fixed": "1.2.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2019-14993" ], "database_specific": { "cwe_ids": [ "CWE-185" ], "github_reviewed": true, "github_reviewed_at": "2023-07-17T21:05:13Z", "nvd_published_at": "2019-08-13T18:15:00Z", "severity": "HIGH" }, "details": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.", "id": "GHSA-qcvw-82hh-gq38", "modified": "2023-07-17T21:05:13Z", "published": "2022-05-24T16:53:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993" }, { "type": "WEB", "url": "https://github.com/envoyproxy/envoy/issues/7728" }, { "type": "WEB", "url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383" }, { "type": "WEB", "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164" }, { "type": "WEB", "url": "https://istio.io/blog/2019/istio-security-003-004" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": "Istio ReDoS Vulnerability" }
fkie_cve-2019-14993
Vulnerability from fkie_nvd
Published
2019-08-13 18:15
Modified
2024-11-21 04:27
Severity ?
Summary
Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383 | Vendor Advisory | |
cve@mitre.org | https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164 | Exploit, Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://github.com/envoyproxy/envoy/issues/7728 | Exploit, Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://istio.io/blog/2019/istio-security-003-004/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/envoyproxy/envoy/issues/7728 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://istio.io/blog/2019/istio-security-003-004/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*", "matchCriteriaId": "20977A28-2513-4FD5-9673-AAA6D9EC8F9F", "versionEndExcluding": "1.1.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA158720-95C9-40E5-B5E6-D9243ADCC3C2", "versionEndExcluding": "1.2.4", "versionStartIncluding": "1.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API." }, { "lang": "es", "value": "Istio antes de 1.1.13 y 1.2.x antes de 1.2.4 maneja mal las expresiones regulares para URI largos, lo que lleva a una denegaci\u00f3n de servicio durante el uso de la API JWT, VirtualService, HTTPAPISpecBinding o QuotaSpecBinding." } ], "id": "CVE-2019-14993", "lastModified": "2024-11-21T04:27:50.113", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-13T18:15:13.117", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/envoyproxy/envoy/issues/7728" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://istio.io/blog/2019/istio-security-003-004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/envoyproxy/envoy/issues/7728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://istio.io/blog/2019/istio-security-003-004/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-185" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2019-14993
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-14993", "description": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.", "id": "GSD-2019-14993", "references": [ "https://www.suse.com/security/cve/CVE-2019-14993.html", "https://access.redhat.com/errata/RHEA-2020:1416" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-14993" ], "details": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.", "id": "GSD-2019-14993", "modified": "2023-12-13T01:23:52.943466Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383", "refsource": "MISC", "url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383" }, { "name": "https://github.com/envoyproxy/envoy/issues/7728", "refsource": "MISC", "url": "https://github.com/envoyproxy/envoy/issues/7728" }, { "name": "https://istio.io/blog/2019/istio-security-003-004/", "refsource": "CONFIRM", "url": "https://istio.io/blog/2019/istio-security-003-004/" }, { "name": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164", "refsource": "MISC", "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164" } ] } }, "gitlab.com": { "advisories": [ { "_git_import_path": "go/github.com/istio/istio", "affected_range": "\u003cv1.1.13 || \u003e=v1.2.0 \u003cv1.2.4", "affected_versions": "All versions before 1.1.13, all versions starting from 1.2.0 before 1.2.4", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-185", "CWE-937" ], "date": "2019-08-16", "description": "Istio mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, `HTTPAPISpecBinding`, or `QuotaSpecBinding` API.", "fixed_versions": [ "v1.2.4" ], "identifier": "CVE-2019-14993", "identifiers": [ "CVE-2019-14993" ], "not_impacted": "All versions before 1.1.13, all versions starting from 1.1.13 before 1.2.0, all versions after 1.2.4", "package_slug": "go/istio.io/istio", "pubdate": "2019-08-13", "solution": "Upgrade to version 1.2.4 or above.", "title": "Incorrect Regular Expression", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2019-14993", "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383", "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164", "https://github.com/envoyproxy/envoy/issues/7728", "https://istio.io/blog/2019/istio-security-003-004/" ], "uuid": "f7fbe1ff-92a8-419c-8dae-9cf3af34f13c", "versions": [ { "commit": { "sha": "adea3b3cbe290092dcdc9e96933273a55a3e1230", "tags": [ "1.2.0" ], "timestamp": "20190618212358" }, "number": "v1.2.0" }, { "commit": { "sha": "e847f0a6603d531e2bd2e04ed3b26b76f529227f", "tags": [ "1.1.13" ], "timestamp": "20190806021111" }, "number": "v1.1.13" }, { "commit": { "sha": "e5003295ac995a671b736c3127926e66267e99ca", "tags": [ "1.2.4" ], "timestamp": "20190806021118" }, "number": "v1.2.4" } ] } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.2.4", "versionStartIncluding": "1.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.1.13", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14993" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-185" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/envoyproxy/envoy/issues/7728", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/envoyproxy/envoy/issues/7728" }, { "name": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164" }, { "name": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383" }, { "name": "https://istio.io/blog/2019/istio-security-003-004/", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://istio.io/blog/2019/istio-security-003-004/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2019-08-16T14:28Z", "publishedDate": "2019-08-13T18:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.