Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Red Hat OpenShift Service Mesh Containers for 2.5.1
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Red Hat OpenShift Service Mesh Containers for 2.5.1
ID: RHSA-2024:1946
Distribution: Red Hat
Plattformen: Red Hat RHOSSM 2.5 for RHEL 8
Datum: Di, 23. April 2024, 06:33
Referenzen: https://access.redhat.com/security/cve/CVE-2023-26159
https://access.redhat.com/errata/RHSA-2024:1946
https://access.redhat.com/security/cve/CVE-2024-28849
https://issues.redhat.com/browse/OSSM-6101
https://issues.redhat.com/browse/OSSM-5959
https://issues.redhat.com/browse/OSSM-6099
https://issues.redhat.com/browse/OSSM-6289
https://access.redhat.com/security/cve/CVE-2024-24786
https://issues.redhat.com/browse/OSSM-6148
https://issues.redhat.com/browse/OSSM-5960
https://issues.redhat.com/browse/OSSM-6163
https://issues.redhat.com/browse/OSSM-6080
https://issues.redhat.com/browse/OSSM-5997
https://issues.redhat.com/browse/OSSM-5902
https://issues.redhat.com/browse/OSSM-5961
https://access.redhat.com/security/cve/CVE-2024-28180
https://issues.redhat.com/browse/OSSM-6264
https://issues.redhat.com/browse/OSSM-6177
https://issues.redhat.com/browse/OSSM-5541
https://issues.redhat.com/browse/OSSM-6261
Applikationen: Red Hat OpenShift Service Mesh Containers for 2.5.1

Originalnachricht

Red Hat OpenShift Service Mesh Containers for 2.5.1

This update has a security impact of Moderate. A Common Vulnerability Scoring
System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio
service mesh project, tailored for installation into an OpenShift Container Platform installation.

Security Fixes:

* follow-redirects: Improper Input Validation due to the improper handling of
URLs by the url.parse() (CVE-2023-26159)
* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in
protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
* jose-go: improper handling of highly compressed data (CVE-2024-28180)
* follow-redirects: Possible credential leak (CVE-2024-28849)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2023-26159: Improper Input Validation (CWE-20)
CVE-2024-24786: Loop with Unreachable Exit Condition ('Infinite Loop')
(CWE-835)
CVE-2024-28180: Improper Handling of Highly Compressed Data (Data
Amplification) (CWE-409)
CVE-2024-28849: Exposure of Sensitive Information to an Unauthorized Actor
(CWE-200)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung