Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-15225 (GCVE-0-2019-15225)
Vulnerability from cvelistv5
Published
2019-08-19 22:57
Modified
2024-08-05 00:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/envoyproxy/envoy/issues/7728 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/envoyproxy/envoy/issues/7728 | Exploit, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:42:01.315Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/envoyproxy/envoy/issues/7728" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-19T22:57:58", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/envoyproxy/envoy/issues/7728" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15225", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/envoyproxy/envoy/issues/7728", "refsource": "MISC", "url": "https://github.com/envoyproxy/envoy/issues/7728" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15225", "datePublished": "2019-08-19T22:57:58", "dateReserved": "2019-08-19T00:00:00", "dateUpdated": "2024-08-05T00:42:01.315Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-15225\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-08-19T23:15:10.680\",\"lastModified\":\"2024-11-21T04:28:14.420\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.\"},{\"lang\":\"es\",\"value\":\"En Envoy versiones hasta 1.11.1, los usuarios pueden configurar una ruta (path) para que coincida con los encabezados de ruta (path) entrantes por medio de la implementaci\u00f3n de expresiones regulares libstdc++. Un atacante remoto puede enviar una petici\u00f3n con una URI muy larga para resultar en una denegaci\u00f3n de servicio (consumo de memoria). Este es un problema relacionado con el CVE-2019-14993.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.11.1\",\"matchCriteriaId\":\"606F68BB-F0D3-4D49-925C-4C5BFB2E120B\"}]}]}],\"references\":[{\"url\":\"https://github.com/envoyproxy/envoy/issues/7728\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/envoyproxy/envoy/issues/7728\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}" } }
rhea-2020_1416
Vulnerability from csaf_redhat
Published
2020-04-08 21:46
Modified
2024-11-22 14:43
Summary
Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs
Notes
Topic
Red Hat OpenShift Service Mesh 1.1.0.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
The OpenShift Service Mesh release notes provide information on the features and known issues:
https://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html
This advisory covers the RPM packages for the release.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Service Mesh 1.1.0.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html\n\nThis advisory covers the RPM packages for the release.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHEA-2020:1416", "url": "https://access.redhat.com/errata/RHEA-2020:1416" }, { "category": "external", "summary": "MAISTRA-907", "url": "https://issues.redhat.com/browse/MAISTRA-907" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhea-2020_1416.json" } ], "title": "Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs", "tracking": { "current_release_date": "2024-11-22T14:43:46+00:00", "generator": { "date": "2024-11-22T14:43:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHEA-2020:1416", "initial_release_date": "2020-04-08T21:46:21+00:00", "revision_history": [ { "date": "2020-04-08T21:46:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-08T21:46:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:43:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 1.1", "product": { "name": "OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Service Mesh 1.1", "product": { "name": "Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product": { "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product_id": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ior-0:1.1.0-3.el8.x86_64", "product": { "name": "ior-0:1.1.0-3.el8.x86_64", "product_id": "ior-0:1.1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product_id": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product": { "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product_id": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product": { "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product_id": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product": { "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product_id": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-citadel@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-galley@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-sidecar-injector@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product": { "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product_id": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product": { "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product_id": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:1.1.0-3.el8.src", "product": { "name": "servicemesh-cni-0:1.1.0-3.el8.src", "product_id": "servicemesh-cni-0:1.1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "ior-0:1.1.0-3.el8.src", "product": { "name": "ior-0:1.1.0-3.el8.src", "product_id": "ior-0:1.1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product_id": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-2.el8.src", "product": { "name": "servicemesh-grafana-0:6.4.3-2.el8.src", "product_id": "servicemesh-grafana-0:6.4.3-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:1.1.0-4.el8.src", "product": { "name": "servicemesh-proxy-0:1.1.0-4.el8.src", "product_id": "servicemesh-proxy-0:1.1.0-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.0-5.el8.src", "product": { "name": "servicemesh-0:1.1.0-5.el8.src", "product_id": "servicemesh-0:1.1.0-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.0-9.el8.src", "product": { "name": "servicemesh-operator-0:1.1.0-9.el8.src", "product_id": "servicemesh-operator-0:1.1.0-9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=src" } } }, { "category": "product_version", "name": "kiali-0:v1.12.7.redhat1-1.el7.src", "product": { "name": "kiali-0:v1.12.7.redhat1-1.el7.src", "product_id": "kiali-0:v1.12.7.redhat1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.7.redhat1-1.el7.src as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src" }, "product_reference": "kiali-0:v1.12.7.redhat1-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64 as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64" }, "product_reference": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src" }, "product_reference": "ior-0:1.1.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64" }, "product_reference": "ior-0:1.1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.0-5.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src" }, "product_reference": "servicemesh-0:1.1.0-5.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src" }, "product_reference": "servicemesh-cni-0:1.1.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64" }, "product_reference": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-2.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src" }, "product_reference": "servicemesh-grafana-0:6.4.3-2.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64" }, "product_reference": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64" }, "product_reference": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.0-9.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src" }, "product_reference": "servicemesh-operator-0:1.1.0-9.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64" }, "product_reference": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src" }, "product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64" }, "product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.0-4.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src" }, "product_reference": "servicemesh-proxy-0:1.1.0-4.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64" }, "product_reference": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14993", "cwe": { "id": "CWE-185", "name": "Incorrect Regular Expression" }, "discovery_date": "2019-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1759816" } ], "notes": [ { "category": "description", "text": "A flaw was found in Istio in versions prior to 1.1.13 and 1.2.4. Regular expressions for long URIs are mishandled leading to a denial of service during the use of JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "istio/envoy: mishandling regular expressions for long URIs leading to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14993" }, { "category": "external", "summary": "RHBZ#1759816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759816" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14993", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993" }, { "category": "external", "summary": "https://istio.io/news/2019/istio-security-003-004/", "url": "https://istio.io/news/2019/istio-security-003-004/" } ], "release_date": "2019-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-08T21:46:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2020:1416" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "istio/envoy: mishandling regular expressions for long URIs leading to DoS" }, { "cve": "CVE-2019-15225", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1765655" } ], "notes": [ { "category": "description", "text": "A flaw was found in Envoy through version 1.11.1. Users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: crafted request with long URI allows remote attacker to cause denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15225" }, { "category": "external", "summary": "RHBZ#1765655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15225", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225" } ], "release_date": "2019-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-08T21:46:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2020:1416" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "envoy: crafted request with long URI allows remote attacker to cause denial of service" } ] }
RHEA-2020:1416
Vulnerability from csaf_redhat
Published
2020-04-08 21:46
Modified
2025-09-25 11:28
Summary
Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs
Notes
Topic
Red Hat OpenShift Service Mesh 1.1.0.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
The OpenShift Service Mesh release notes provide information on the features and known issues:
https://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html
This advisory covers the RPM packages for the release.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Service Mesh 1.1.0.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html\n\nThis advisory covers the RPM packages for the release.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHEA-2020:1416", "url": "https://access.redhat.com/errata/RHEA-2020:1416" }, { "category": "external", "summary": "MAISTRA-907", "url": "https://issues.redhat.com/browse/MAISTRA-907" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhea-2020_1416.json" } ], "title": "Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs", "tracking": { "current_release_date": "2025-09-25T11:28:40+00:00", "generator": { "date": "2025-09-25T11:28:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHEA-2020:1416", "initial_release_date": "2020-04-08T21:46:21+00:00", "revision_history": [ { "date": "2020-04-08T21:46:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-08T21:46:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-25T11:28:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 1.1", "product": { "name": "OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Service Mesh 1.1", "product": { "name": "Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product": { "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product_id": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ior-0:1.1.0-3.el8.x86_64", "product": { "name": "ior-0:1.1.0-3.el8.x86_64", "product_id": "ior-0:1.1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product_id": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product": { "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product_id": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product": { "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product_id": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product": { "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product_id": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-citadel@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-galley@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-sidecar-injector@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product": { "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product_id": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product": { "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product_id": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:1.1.0-3.el8.src", "product": { "name": "servicemesh-cni-0:1.1.0-3.el8.src", "product_id": "servicemesh-cni-0:1.1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "ior-0:1.1.0-3.el8.src", "product": { "name": "ior-0:1.1.0-3.el8.src", "product_id": "ior-0:1.1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product_id": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-2.el8.src", "product": { "name": "servicemesh-grafana-0:6.4.3-2.el8.src", "product_id": "servicemesh-grafana-0:6.4.3-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:1.1.0-4.el8.src", "product": { "name": "servicemesh-proxy-0:1.1.0-4.el8.src", "product_id": "servicemesh-proxy-0:1.1.0-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.0-5.el8.src", "product": { "name": "servicemesh-0:1.1.0-5.el8.src", "product_id": "servicemesh-0:1.1.0-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.0-9.el8.src", "product": { "name": "servicemesh-operator-0:1.1.0-9.el8.src", "product_id": "servicemesh-operator-0:1.1.0-9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=src" } } }, { "category": "product_version", "name": "kiali-0:v1.12.7.redhat1-1.el7.src", "product": { "name": "kiali-0:v1.12.7.redhat1-1.el7.src", "product_id": "kiali-0:v1.12.7.redhat1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.7.redhat1-1.el7.src as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src" }, "product_reference": "kiali-0:v1.12.7.redhat1-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64 as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64" }, "product_reference": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src" }, "product_reference": "ior-0:1.1.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64" }, "product_reference": "ior-0:1.1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.0-5.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src" }, "product_reference": "servicemesh-0:1.1.0-5.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src" }, "product_reference": "servicemesh-cni-0:1.1.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64" }, "product_reference": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-2.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src" }, "product_reference": "servicemesh-grafana-0:6.4.3-2.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64" }, "product_reference": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64" }, "product_reference": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.0-9.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src" }, "product_reference": "servicemesh-operator-0:1.1.0-9.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64" }, "product_reference": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src" }, "product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64" }, "product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.0-4.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src" }, "product_reference": "servicemesh-proxy-0:1.1.0-4.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64" }, "product_reference": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14993", "cwe": { "id": "CWE-185", "name": "Incorrect Regular Expression" }, "discovery_date": "2019-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1759816" } ], "notes": [ { "category": "description", "text": "A flaw was found in Istio in versions prior to 1.1.13 and 1.2.4. Regular expressions for long URIs are mishandled leading to a denial of service during the use of JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "istio/envoy: mishandling regular expressions for long URIs leading to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14993" }, { "category": "external", "summary": "RHBZ#1759816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759816" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14993", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993" }, { "category": "external", "summary": "https://istio.io/news/2019/istio-security-003-004/", "url": "https://istio.io/news/2019/istio-security-003-004/" } ], "release_date": "2019-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-08T21:46:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2020:1416" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "istio/envoy: mishandling regular expressions for long URIs leading to DoS" }, { "cve": "CVE-2019-15225", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1765655" } ], "notes": [ { "category": "description", "text": "A flaw was found in Envoy through version 1.11.1. Users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: crafted request with long URI allows remote attacker to cause denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15225" }, { "category": "external", "summary": "RHBZ#1765655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15225", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225" } ], "release_date": "2019-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-08T21:46:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2020:1416" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "envoy: crafted request with long URI allows remote attacker to cause denial of service" } ] }
rhea-2020:1416
Vulnerability from csaf_redhat
Published
2020-04-08 21:46
Modified
2025-09-25 11:28
Summary
Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs
Notes
Topic
Red Hat OpenShift Service Mesh 1.1.0.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
The OpenShift Service Mesh release notes provide information on the features and known issues:
https://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html
This advisory covers the RPM packages for the release.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Service Mesh 1.1.0.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html\n\nThis advisory covers the RPM packages for the release.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHEA-2020:1416", "url": "https://access.redhat.com/errata/RHEA-2020:1416" }, { "category": "external", "summary": "MAISTRA-907", "url": "https://issues.redhat.com/browse/MAISTRA-907" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhea-2020_1416.json" } ], "title": "Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs", "tracking": { "current_release_date": "2025-09-25T11:28:40+00:00", "generator": { "date": "2025-09-25T11:28:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHEA-2020:1416", "initial_release_date": "2020-04-08T21:46:21+00:00", "revision_history": [ { "date": "2020-04-08T21:46:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-08T21:46:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-25T11:28:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 1.1", "product": { "name": "OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Service Mesh 1.1", "product": { "name": "Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product": { "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product_id": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ior-0:1.1.0-3.el8.x86_64", "product": { "name": "ior-0:1.1.0-3.el8.x86_64", "product_id": "ior-0:1.1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product_id": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product": { "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product_id": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product": { "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product_id": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product": { "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product_id": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-citadel@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-galley@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-istioctl@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixc@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-mixs@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product": { "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product_id": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-sidecar-injector@1.1.0-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product": { "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product_id": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product": { "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product_id": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "servicemesh-cni-0:1.1.0-3.el8.src", "product": { "name": "servicemesh-cni-0:1.1.0-3.el8.src", "product_id": "servicemesh-cni-0:1.1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "ior-0:1.1.0-3.el8.src", "product": { "name": "ior-0:1.1.0-3.el8.src", "product_id": "ior-0:1.1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product_id": "servicemesh-prometheus-0:2.14.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-grafana-0:6.4.3-2.el8.src", "product": { "name": "servicemesh-grafana-0:6.4.3-2.el8.src", "product_id": "servicemesh-grafana-0:6.4.3-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-proxy-0:1.1.0-4.el8.src", "product": { "name": "servicemesh-proxy-0:1.1.0-4.el8.src", "product_id": "servicemesh-proxy-0:1.1.0-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-0:1.1.0-5.el8.src", "product": { "name": "servicemesh-0:1.1.0-5.el8.src", "product_id": "servicemesh-0:1.1.0-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-operator-0:1.1.0-9.el8.src", "product": { "name": "servicemesh-operator-0:1.1.0-9.el8.src", "product_id": "servicemesh-operator-0:1.1.0-9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=src" } } }, { "category": "product_version", "name": "kiali-0:v1.12.7.redhat1-1.el7.src", "product": { "name": "kiali-0:v1.12.7.redhat1-1.el7.src", "product_id": "kiali-0:v1.12.7.redhat1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.7.redhat1-1.el7.src as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src" }, "product_reference": "kiali-0:v1.12.7.redhat1-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64 as a component of Red Hat OpenShift Service Mesh 1.1", "product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64" }, "product_reference": "kiali-0:v1.12.7.redhat1-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src" }, "product_reference": "ior-0:1.1.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ior-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64" }, "product_reference": "ior-0:1.1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.0-5.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src" }, "product_reference": "servicemesh-0:1.1.0-5.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-citadel-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src" }, "product_reference": "servicemesh-cni-0:1.1.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64" }, "product_reference": "servicemesh-cni-0:1.1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-galley-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-galley-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-2.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src" }, "product_reference": "servicemesh-grafana-0:6.4.3-2.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64" }, "product_reference": "servicemesh-grafana-0:6.4.3-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64" }, "product_reference": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-mixc-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-mixs-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.0-9.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src" }, "product_reference": "servicemesh-operator-0:1.1.0-9.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:1.1.0-9.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64" }, "product_reference": "servicemesh-operator-0:1.1.0-9.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src" }, "product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64" }, "product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.0-4.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src" }, "product_reference": "servicemesh-proxy-0:1.1.0-4.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64" }, "product_reference": "servicemesh-proxy-0:1.1.0-4.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" }, "product_reference": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14993", "cwe": { "id": "CWE-185", "name": "Incorrect Regular Expression" }, "discovery_date": "2019-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1759816" } ], "notes": [ { "category": "description", "text": "A flaw was found in Istio in versions prior to 1.1.13 and 1.2.4. Regular expressions for long URIs are mishandled leading to a denial of service during the use of JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "istio/envoy: mishandling regular expressions for long URIs leading to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14993" }, { "category": "external", "summary": "RHBZ#1759816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759816" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14993", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993" }, { "category": "external", "summary": "https://istio.io/news/2019/istio-security-003-004/", "url": "https://istio.io/news/2019/istio-security-003-004/" } ], "release_date": "2019-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-08T21:46:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2020:1416" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "istio/envoy: mishandling regular expressions for long URIs leading to DoS" }, { "cve": "CVE-2019-15225", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1765655" } ], "notes": [ { "category": "description", "text": "A flaw was found in Envoy through version 1.11.1. Users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "envoy: crafted request with long URI allows remote attacker to cause denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15225" }, { "category": "external", "summary": "RHBZ#1765655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15225", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15225" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225" } ], "release_date": "2019-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-08T21:46:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2020:1416" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src", "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src", "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src", "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64", "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src", "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src", "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64", "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "envoy: crafted request with long URI allows remote attacker to cause denial of service" } ] }
fkie_cve-2019-15225
Vulnerability from fkie_nvd
Published
2019-08-19 23:15
Modified
2024-11-21 04:28
Severity ?
Summary
In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/envoyproxy/envoy/issues/7728 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/envoyproxy/envoy/issues/7728 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
envoyproxy | envoy | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", "matchCriteriaId": "606F68BB-F0D3-4D49-925C-4C5BFB2E120B", "versionEndIncluding": "1.11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993." }, { "lang": "es", "value": "En Envoy versiones hasta 1.11.1, los usuarios pueden configurar una ruta (path) para que coincida con los encabezados de ruta (path) entrantes por medio de la implementaci\u00f3n de expresiones regulares libstdc++. Un atacante remoto puede enviar una petici\u00f3n con una URI muy larga para resultar en una denegaci\u00f3n de servicio (consumo de memoria). Este es un problema relacionado con el CVE-2019-14993." } ], "id": "CVE-2019-15225", "lastModified": "2024-11-21T04:28:14.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-19T23:15:10.680", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/envoyproxy/envoy/issues/7728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/envoyproxy/envoy/issues/7728" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-fgr2-cr98-vm44
Vulnerability from github
Published
2022-05-24 16:53
Modified
2024-04-04 01:42
Severity ?
VLAI Severity ?
Details
In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.
{ "affected": [], "aliases": [ "CVE-2019-15225" ], "database_specific": { "cwe_ids": [ "CWE-770" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-08-19T23:15:00Z", "severity": "HIGH" }, "details": "In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.", "id": "GHSA-fgr2-cr98-vm44", "modified": "2024-04-04T01:42:23Z", "published": "2022-05-24T16:53:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225" }, { "type": "WEB", "url": "https://github.com/envoyproxy/envoy/issues/7728" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2019-15225
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-15225", "description": "In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.", "id": "GSD-2019-15225", "references": [ "https://access.redhat.com/errata/RHEA-2020:1416" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-15225" ], "details": "In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.", "id": "GSD-2019-15225", "modified": "2023-12-13T01:23:38.472401Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15225", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/envoyproxy/envoy/issues/7728", "refsource": "MISC", "url": "https://github.com/envoyproxy/envoy/issues/7728" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.11.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15225" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-770" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/envoyproxy/envoy/issues/7728", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/envoyproxy/envoy/issues/7728" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2020-08-24T17:37Z", "publishedDate": "2019-08-19T23:15Z" } } }
cnvd-2019-42776
Vulnerability from cnvd
Title: Envoy资源管理错误漏洞
Description:
Envoy是一款开源的分布式代理服务器。
Envoy 1.11.1及之前版本中存在资源管理错误漏洞,远程攻击者可通过发送带有较长URI的请求利用该漏洞造成拒绝服务(内存消耗)。
Severity: 中
Formal description:
厂商尚未提供漏洞修复方案,请关注厂商主页更新: https://www.envoyproxy.io/
Reference: https://github.com/envoyproxy/envoy/issues/7728
Impacted products
Name | Envoy Envoy <=1.11.1 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-15225", "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15225" } }, "description": "Envoy\u662f\u4e00\u6b3e\u5f00\u6e90\u7684\u5206\u5e03\u5f0f\u4ee3\u7406\u670d\u52a1\u5668\u3002\n\nEnvoy 1.11.1\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u5e26\u6709\u8f83\u957fURI\u7684\u8bf7\u6c42\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5185\u5b58\u6d88\u8017\uff09\u3002", "formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u66f4\u65b0\uff1a\r\nhttps://www.envoyproxy.io/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-42776", "openTime": "2019-11-29", "products": { "product": "Envoy Envoy \u003c=1.11.1" }, "referenceLink": "https://github.com/envoyproxy/envoy/issues/7728", "serverity": "\u4e2d", "submitTime": "2019-08-19", "title": "Envoy\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…