RedHat: RHSA-2020-0734:01 Moderate: Red Hat OpenShift Service Mesh 1.0.9
Summary
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio
service mesh project, tailored for installation into an on-premise
OpenShift Container Platform installation.
Security Fix(es):
* envoy: Excessive CPU and/or memory usage when proxying HTTP/1.1
(CVE-2020-8659)
* envoy: TLS inspector bypassc (CVE-2020-8660)
* envoy: Response flooding for HTTP/1.1 (CVE-2020-8661)
* envoy: Incorrect Access Control when using SDS with Combined Validation
Context (CVE-2020-8664)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
The OpenShift Service Mesh release notes provide information on the
features and known issues:
https://docs.openshift.com/container-platform/4.3/service_mesh/v1x/servicemesh-release-notes.html
References
https://access.redhat.com/security/cve/CVE-2020-8659 https://access.redhat.com/security/cve/CVE-2020-8660 https://access.redhat.com/security/cve/CVE-2020-8661 https://access.redhat.com/security/cve/CVE-2020-8664 https://access.redhat.com/security/updates/classification/#moderate
Package List
OpenShift Service Mesh 1.0:
Source:
servicemesh-proxy-1.0.9-2.el8.src.rpm
x86_64:
servicemesh-proxy-1.0.9-2.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
Red Hat OpenShift Service Mesh 1.0.9.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
OpenShift Service Mesh 1.0 - x86_64
Bugs Fixed
1802539 - CVE-2020-8659 envoy: Excessive CPU and/or memory usage when proxying HTTP/1.1
1802540 - CVE-2020-8661 envoy: Response flooding for HTTP/1.1
1802542 - CVE-2020-8664 envoy: Incorrect Access Control when using SDS with Combined Validation Context
1802545 - CVE-2020-8660 envoy: TLS inspector bypassc