Red Hat Security Advisory 2022-5915-01 - Red Hat Kiali for OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. This advisory covers containers for the release. Issues addressed include a denial of service vulnerability.
cdcfd73b6cdd2ceb6501ce89d6ca23026e96b2f4590c9e01a20fe55461da72be
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Red Hat Kiali for OpenShift Service Mesh 2.2 security update
Advisory ID: RHSA-2022:5915-01
Product: Red Hat OpenShift Service Mesh
Advisory URL: https://access.redhat.com/errata/RHSA-2022:5915
Issue date: 2022-08-08
CVE Names: CVE-2022-31129
=====================================================================
1. Summary:
Red Hat Kiali for OpenShift Service Mesh 2.2 Containers
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Description:
Red Hat Kiali for OpenShift Service Mesh is Red Hat's distribution of the
Istio service mesh project, tailored for installation into an on-premise
OpenShift Container Platform installation.
This advisory covers containers for the release.
Security Fix(es):
* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
3. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
4. Bugs fixed (https://bugzilla.redhat.com/):
2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS
5. JIRA issues fixed (https://issues.jboss.org/):
OSSM-1821 - Rebuild container images (container and operator)1.48 to pick up base image CVE fixes
6. References:
https://access.redhat.com/security/cve/CVE-2022-31129
https://access.redhat.com/security/updates/classification/#moderate
7. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=5dFf
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce