-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat OpenShift Service Mesh Containers for 2.4.2 security update Advisory ID: RHSA-2023:4625-01 Product: Red Hat OpenShift Service Mesh Advisory URL: https://access.redhat.com/errata/RHSA-2023:4625 Issue date: 2023-08-11 CVE Names: CVE-2023-2828 CVE-2023-35941 CVE-2023-35943 CVE-2023-35944 ===================================================================== 1. Summary: Red Hat OpenShift Service Mesh 2.4.2 Containers Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Security Fix(es): * envoy: OAuth2 credentials exploit with permanent validity (CVE-2023-35941) * envoy: Incorrect handling of HTTP requests and responses with mixed case schemes (CVE-2023-35944) * envoy: CORS filter segfault when origin header is removed (CVE-2023-35943) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2217977 - CVE-2023-35941 envoy: OAuth2 credentials exploit with permanent validity 2217985 - CVE-2023-35944 envoy: Incorrect handling of HTTP requests and responses with mixed case schemes 2217987 - CVE-2023-35943 envoy: CORS filter segfault when origin header is removed 5. References: https://access.redhat.com/security/cve/CVE-2023-2828 https://access.redhat.com/security/cve/CVE-2023-35941 https://access.redhat.com/security/cve/CVE-2023-35943 https://access.redhat.com/security/cve/CVE-2023-35944 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJk1pgEAAoJENzjgjWX9erEdf8P/R2dp7OtPRZPuUU1x21pHihH Ks8Pu3HrM3aWGm6GBBEeEJ/kw+S/Jjiy+L06w1NuzemAUfP/tTkqlRTjyqmCZpwk JjwmO3ee7Z8Lz+LJbLPa2EX+h0hNbyP0xn58Z82fZdfJcCM696fzNIvYMwoJEgp0 wB/T3ZI625iNN4gWJrV1w4IbyvVXJ1J3RC+gYW8i2IfpR+1jeNQ0RAbgjSSEYGZO HvwWuvwx8JYlPDHuXZbG9IkSngOl+W8rULiQVUr1adClGl9lFiYBservNLJ2Kt2E obkiqsZRPhPmLiSM9xJPHM3y3eqVJgAjFIUzzbiFEDfE8jnZza1rnEE1sCoZk+p8 /8HQnPdNK6GKMbxpAFQRTvL3Cjy8NnWFqf44RvjX212SlCnNxw+cQnYF3XhtH+uc 6Z2ALAgbW5k3smrWAnS2W4uaJdKVX6RBDewDe4BeXxq5kAwsjtDfGOtacl4Gj8Ia UEUopVSdpr83/BQwD6T1F33A8IkDWMl5cIOB3ZpnoYkNvkAAM65vrOfIIcxN1AfD j4LTNmRoVGl3SgVxbDZTb/d1nhwq5fAYZfYfyHIoGYt7dPUUC/z4LNFwuGWGRqfo fqpoA40Ja6hCphgueK4LeH+yGKvQCK1eftSSA3zXqn1EKa7P59LzfPZunyS56Kh/ pEqFz6KLYjjapPMGqs6Q =ffX8 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce