- Issued:
- 2023-06-15
- Updated:
- 2023-06-15
RHSA-2023:3644 - Security Advisory
Synopsis
Important: Red Hat OpenShift Service Mesh Containers for 2.4.0
Type/Severity
Security Advisory: Important
Topic
Red Hat OpenShift Service Mesh Containers for 2.4.0
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
This advisory covers container images for the release.
Security Fix(es):
- golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat OpenShift Service Mesh 2 for RHEL 8 x86_64
- Red Hat OpenShift Service Mesh for Power 2 for RHEL 8 ppc64le
- Red Hat OpenShift Service Mesh for IBM Z 2 for RHEL 8 s390x
Fixes
- BZ - 2196027 - CVE-2023-24540 golang: html/template: improper handling of JavaScript whitespace
- OSSM-2254 - Fix and deprecate IOR
- OSSM-3246 - Promote ClusterWide to GA
- OSSM-331 - Service Mesh IPv6 Single Stack Support
- OSSM-3870 - OSSM must-gather improvements
- OSSM-566 - Supported integration with OpenShift Monitoring and BYO Prometheus
- OSSM-568 - Integration with (external) cert-manager
- OSSM-1094 - Htpasswd secret created in control plane namespace is using SHA1
- OSSM-1667 - Remove deprecated cipher suites
- OSSM-2128 - Exclude some accessible namespaces in Kiali CR with some labelSelector
- OSSM-2215 - istio-cni-node never updates kubeconfig causing error adding container to network \"v2-0-istio-cni\": Unauthorized
- OSSM-2221 - Gateway injection does not work in control plane namespace
- OSSM-2274 - If two SMCPs exist in a namespace and you delete one, all child resources are deleted
- OSSM-2325 - Disable prometheus in the minimal example CR
- OSSM-2339 - Deprecated istio-operator API call in CNV
- OSSM-2420 - Pod locality controller fails to update pod
- OSSM-2436 - istio-operator reports as ready before it really is
- OSSM-3288 - Implement prometheus extension provider
- OSSM-3291 - Implement envoyExtAuthzHttp extension provider
- OSSM-3419 - Align OSSM 2.4 with latest upstream Istio 1.16.5 release
- OSSM-3747 - Duplicate env vars in egress gateway deployment
- OSSM-3784 - Bad ownerReference in k8s Gateway Deployment & Service
- OSSM-3802 - GA discoverySelectors (move out of techPreview.meshConfig)
- OSSM-3803 - Move extensionProviders to SMCP.spec.meshConfig.extensionProviders
- OSSM-3873 - [KIALI] Kiali ingress.host accepted in the SMCP but is not configured properly in Kiali CR
- OSSM-3934 - Prometheus and grafana not reachable from kiali
- OSSM-3986 - Kiali does not display all the data when SMCP is deployed with Cluster Wide mode
- OSSM-4037 - kiali operator base image bump
- OSSM-4069 - Kiali route is missing with 2.2 Control Plane in 2.4 Operator on OpenShift 4.13
CVEs
- CVE-2021-4235
- CVE-2022-1705
- CVE-2022-2795
- CVE-2022-2879
- CVE-2022-2880
- CVE-2022-2995
- CVE-2022-3162
- CVE-2022-3172
- CVE-2022-3204
- CVE-2022-3259
- CVE-2022-3466
- CVE-2022-27664
- CVE-2022-30631
- CVE-2022-32148
- CVE-2022-32189
- CVE-2022-32190
- CVE-2022-36227
- CVE-2022-39229
- CVE-2022-41715
- CVE-2023-24540
- CVE-2023-27535
ppc64le
openshift-service-mesh/grafana-rhel8@sha256:fad8eeaa0dd5268c260d11582682bb7ec436488f5e35caae3a825b84ee3b1b35 |
openshift-service-mesh/istio-cni-rhel8@sha256:b3febdb34083218e8b4d5559bcfd0eab9decaae886089509453b34237e94a541 |
openshift-service-mesh/istio-must-gather-rhel8@sha256:1f1f2f8f9ae365a9c2b905bf4e903c428f06b16995e64e4448425f5c74656fc8 |
openshift-service-mesh/istio-rhel8-operator@sha256:4a9dc1d3e45460d3bc699932f5b9345c81d4c5740c7cacdf550691f7e02d743b |
openshift-service-mesh/kiali-rhel8@sha256:0689fd1d69fee4dae484769ea0c22255f89efee25cf7c60d8ee18add49beb09e |
openshift-service-mesh/kiali-rhel8-operator@sha256:f2df08223aabbbe73f3ad226eacfef342e9cd7dc9d9f76831784837233e9bab3 |
openshift-service-mesh/pilot-rhel8@sha256:a362627eabd321590db36618cf3de49beab01a90144833844f89d1da913cb1bc |
openshift-service-mesh/proxyv2-rhel8@sha256:c4855989391c62d30a50c61d0da7019767502cb40f04bf02d147aa1c4478d9f1 |
openshift-service-mesh/ratelimit-rhel8@sha256:beb9b3aab05f3ebe80ee1358f8be8dfe55d3e9616cec5ab542e8360bbd61667c |
s390x
openshift-service-mesh/grafana-rhel8@sha256:f4abc32571c1d18f5af3d08ad7fc0cb7d31a90af31273477e0158629dcb0c390 |
openshift-service-mesh/istio-cni-rhel8@sha256:0b6e8b4d5ce3866ec2f7a85dc7fa56bbd68ecc1d9d145e9843fdb081e57b255d |
openshift-service-mesh/istio-must-gather-rhel8@sha256:e79559de1bb9c1ca62b2b913598716094c51c859a594754688f566332d018280 |
openshift-service-mesh/istio-rhel8-operator@sha256:ea48a2037f74ad55c2595dbec3e44ed4a764ccd1d5021c6b3ed8a5a579167f18 |
openshift-service-mesh/kiali-rhel8@sha256:61404d6af307383070c63d73a55500f9b13ebe9eb0cf37128db5d565fc13cd9e |
openshift-service-mesh/kiali-rhel8-operator@sha256:6c765c163e66ef63bc1c0bec6365ffd529bc82a344bcf1d854cd64ec1cc936e7 |
openshift-service-mesh/pilot-rhel8@sha256:4ada7b103b5f4b8c567544ce19fb00fbf7fa0e11ad4a7b5a4ac44541558c3bc6 |
openshift-service-mesh/proxyv2-rhel8@sha256:8c78626f5d486a75b2c07e82479d30e294e929c9c04e2db09b413838c1d5b965 |
openshift-service-mesh/ratelimit-rhel8@sha256:5a17a81c29f147812f1e8c52131828d84e3b404223f4099c2dfa7323d3345586 |
x86_64
openshift-service-mesh/grafana-rhel8@sha256:0244c6a3dfe7b04a1f947987c14236372be9c9107d91c4715001edee8e302f15 |
openshift-service-mesh/istio-cni-rhel8@sha256:4b5bb6078895f25ac0fe1f095a6b474b81c45fd11b1aec33cc7b6f3921517829 |
openshift-service-mesh/istio-must-gather-rhel8@sha256:8571b1b158048380e4133c1d89a7770990a73b6a4c778a04f20e66c047c4c993 |
openshift-service-mesh/istio-rhel8-operator@sha256:88e72801cc48bf310ca498c1f9c995dacc70b0570d9046627e9e8133d68ba619 |
openshift-service-mesh/kiali-rhel8@sha256:3c8e44952e2d2a0fd690c7bf3e75777dda03776334a6e830658a34fe15934833 |
openshift-service-mesh/kiali-rhel8-operator@sha256:42d32c0b9b3d9f822606ee087c6ce6284f9908bc2a33cb7d12b89ea0cec7b9a8 |
openshift-service-mesh/pilot-rhel8@sha256:c88d1f0fa0fca2def48975c4174929125b4189dde358c168435a3b8475792640 |
openshift-service-mesh/proxyv2-rhel8@sha256:f3f17317795e4526ec3478be6ada6e099b9886fa354dc9c917abff52063f1f9e |
openshift-service-mesh/ratelimit-rhel8@sha256:3caa8b6f3f940c7cd4ba2fb21522572dec2c7d6ae2ea31f2a377c4dfeea0b981 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.