Red Hat OpenShift Service Mesh Containers for 2.5.1
This update has a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation.
Security Fixes:
* follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159) * golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786) * jose-go: improper handling of highly compressed data (CVE-2024-28180) * follow-redirects: Possible credential leak (CVE-2024-28849)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
CVE-2023-26159: Improper Input Validation (CWE-20) CVE-2024-24786: Loop with Unreachable Exit Condition ('Infinite Loop') (CWE-835) CVE-2024-28180: Improper Handling of Highly Compressed Data (Data Amplification) (CWE-409) CVE-2024-28849: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
|