Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-14993 (GCVE-0-2019-14993)
Vulnerability from cvelistv5 – Published: 2019-08-13 17:38 – Updated: 2024-08-05 00:34
VLAI?
EPSS
Summary
Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T00:34:53.164Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/envoyproxy/envoy/issues/7728"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://istio.io/blog/2019/istio-security-003-004/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-08-13T17:38:39",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/envoyproxy/envoy/issues/7728"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://istio.io/blog/2019/istio-security-003-004/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14993",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383",
"refsource": "MISC",
"url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383"
},
{
"name": "https://github.com/envoyproxy/envoy/issues/7728",
"refsource": "MISC",
"url": "https://github.com/envoyproxy/envoy/issues/7728"
},
{
"name": "https://istio.io/blog/2019/istio-security-003-004/",
"refsource": "CONFIRM",
"url": "https://istio.io/blog/2019/istio-security-003-004/"
},
{
"name": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164",
"refsource": "MISC",
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-14993",
"datePublished": "2019-08-13T17:38:39",
"dateReserved": "2019-08-13T00:00:00",
"dateUpdated": "2024-08-05T00:34:53.164Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.1.13\", \"matchCriteriaId\": \"20977A28-2513-4FD5-9673-AAA6D9EC8F9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.2.0\", \"versionEndExcluding\": \"1.2.4\", \"matchCriteriaId\": \"FA158720-95C9-40E5-B5E6-D9243ADCC3C2\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.\"}, {\"lang\": \"es\", \"value\": \"Istio antes de 1.1.13 y 1.2.x antes de 1.2.4 maneja mal las expresiones regulares para URI largos, lo que lleva a una denegaci\\u00f3n de servicio durante el uso de la API JWT, VirtualService, HTTPAPISpecBinding o QuotaSpecBinding.\"}]",
"id": "CVE-2019-14993",
"lastModified": "2024-11-21T04:27:50.113",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-08-13T18:15:13.117",
"references": "[{\"url\": \"https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/envoyproxy/envoy/issues/7728\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://istio.io/blog/2019/istio-security-003-004/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/envoyproxy/envoy/issues/7728\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://istio.io/blog/2019/istio-security-003-004/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-185\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-14993\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-08-13T18:15:13.117\",\"lastModified\":\"2024-11-21T04:27:50.113\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.\"},{\"lang\":\"es\",\"value\":\"Istio antes de 1.1.13 y 1.2.x antes de 1.2.4 maneja mal las expresiones regulares para URI largos, lo que lleva a una denegaci\u00f3n de servicio durante el uso de la API JWT, VirtualService, HTTPAPISpecBinding o QuotaSpecBinding.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-185\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.13\",\"matchCriteriaId\":\"20977A28-2513-4FD5-9673-AAA6D9EC8F9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.2.0\",\"versionEndExcluding\":\"1.2.4\",\"matchCriteriaId\":\"FA158720-95C9-40E5-B5E6-D9243ADCC3C2\"}]}]}],\"references\":[{\"url\":\"https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/envoyproxy/envoy/issues/7728\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://istio.io/blog/2019/istio-security-003-004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/envoyproxy/envoy/issues/7728\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://istio.io/blog/2019/istio-security-003-004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
FKIE_CVE-2019-14993
Vulnerability from fkie_nvd - Published: 2019-08-13 18:15 - Updated: 2024-11-21 04:27
Severity ?
Summary
Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383 | Vendor Advisory | |
| cve@mitre.org | https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164 | Exploit, Issue Tracking, Third Party Advisory | |
| cve@mitre.org | https://github.com/envoyproxy/envoy/issues/7728 | Exploit, Issue Tracking, Third Party Advisory | |
| cve@mitre.org | https://istio.io/blog/2019/istio-security-003-004/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164 | Exploit, Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/envoyproxy/envoy/issues/7728 | Exploit, Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://istio.io/blog/2019/istio-security-003-004/ | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20977A28-2513-4FD5-9673-AAA6D9EC8F9F",
"versionEndExcluding": "1.1.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA158720-95C9-40E5-B5E6-D9243ADCC3C2",
"versionEndExcluding": "1.2.4",
"versionStartIncluding": "1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API."
},
{
"lang": "es",
"value": "Istio antes de 1.1.13 y 1.2.x antes de 1.2.4 maneja mal las expresiones regulares para URI largos, lo que lleva a una denegaci\u00f3n de servicio durante el uso de la API JWT, VirtualService, HTTPAPISpecBinding o QuotaSpecBinding."
}
],
"id": "CVE-2019-14993",
"lastModified": "2024-11-21T04:27:50.113",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-08-13T18:15:13.117",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/envoyproxy/envoy/issues/7728"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://istio.io/blog/2019/istio-security-003-004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/envoyproxy/envoy/issues/7728"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://istio.io/blog/2019/istio-security-003-004/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-185"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2019-14993
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-14993",
"description": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.",
"id": "GSD-2019-14993",
"references": [
"https://www.suse.com/security/cve/CVE-2019-14993.html",
"https://access.redhat.com/errata/RHEA-2020:1416"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-14993"
],
"details": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.",
"id": "GSD-2019-14993",
"modified": "2023-12-13T01:23:52.943466Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14993",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383",
"refsource": "MISC",
"url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383"
},
{
"name": "https://github.com/envoyproxy/envoy/issues/7728",
"refsource": "MISC",
"url": "https://github.com/envoyproxy/envoy/issues/7728"
},
{
"name": "https://istio.io/blog/2019/istio-security-003-004/",
"refsource": "CONFIRM",
"url": "https://istio.io/blog/2019/istio-security-003-004/"
},
{
"name": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164",
"refsource": "MISC",
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"_git_import_path": "go/github.com/istio/istio",
"affected_range": "\u003cv1.1.13 || \u003e=v1.2.0 \u003cv1.2.4",
"affected_versions": "All versions before 1.1.13, all versions starting from 1.2.0 before 1.2.4",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-185",
"CWE-937"
],
"date": "2019-08-16",
"description": "Istio mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, `HTTPAPISpecBinding`, or `QuotaSpecBinding` API.",
"fixed_versions": [
"v1.2.4"
],
"identifier": "CVE-2019-14993",
"identifiers": [
"CVE-2019-14993"
],
"not_impacted": "All versions before 1.1.13, all versions starting from 1.1.13 before 1.2.0, all versions after 1.2.4",
"package_slug": "go/istio.io/istio",
"pubdate": "2019-08-13",
"solution": "Upgrade to version 1.2.4 or above.",
"title": "Incorrect Regular Expression",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2019-14993",
"https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383",
"https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164",
"https://github.com/envoyproxy/envoy/issues/7728",
"https://istio.io/blog/2019/istio-security-003-004/"
],
"uuid": "f7fbe1ff-92a8-419c-8dae-9cf3af34f13c",
"versions": [
{
"commit": {
"sha": "adea3b3cbe290092dcdc9e96933273a55a3e1230",
"tags": [
"1.2.0"
],
"timestamp": "20190618212358"
},
"number": "v1.2.0"
},
{
"commit": {
"sha": "e847f0a6603d531e2bd2e04ed3b26b76f529227f",
"tags": [
"1.1.13"
],
"timestamp": "20190806021111"
},
"number": "v1.1.13"
},
{
"commit": {
"sha": "e5003295ac995a671b736c3127926e66267e99ca",
"tags": [
"1.2.4"
],
"timestamp": "20190806021118"
},
"number": "v1.2.4"
}
]
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.2.4",
"versionStartIncluding": "1.2.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.1.13",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14993"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-185"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/envoyproxy/envoy/issues/7728",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/envoyproxy/envoy/issues/7728"
},
{
"name": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164"
},
{
"name": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383"
},
{
"name": "https://istio.io/blog/2019/istio-security-003-004/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://istio.io/blog/2019/istio-security-003-004/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2019-08-16T14:28Z",
"publishedDate": "2019-08-13T18:15Z"
}
}
}
RHEA-2020:1416
Vulnerability from csaf_redhat - Published: 2020-04-08 21:46 - Updated: 2025-11-21 17:24Summary
Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs
Notes
Topic
Red Hat OpenShift Service Mesh 1.1.0.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
The OpenShift Service Mesh release notes provide information on the features and known issues:
https://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html
This advisory covers the RPM packages for the release.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Service Mesh 1.1.0.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html\n\nThis advisory covers the RPM packages for the release.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2020:1416",
"url": "https://access.redhat.com/errata/RHEA-2020:1416"
},
{
"category": "external",
"summary": "MAISTRA-907",
"url": "https://issues.redhat.com/browse/MAISTRA-907"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhea-2020_1416.json"
}
],
"title": "Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs",
"tracking": {
"current_release_date": "2025-11-21T17:24:19+00:00",
"generator": {
"date": "2025-11-21T17:24:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHEA-2020:1416",
"initial_release_date": "2020-04-08T21:46:21+00:00",
"revision_history": [
{
"date": "2020-04-08T21:46:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-04-08T21:46:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:24:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Service Mesh 1.1",
"product": {
"name": "OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:1.1::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Service Mesh 1.1",
"product": {
"name": "Red Hat OpenShift Service Mesh 1.1",
"product_id": "7Server-RH7-RHOSSM-1.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:1.1::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "servicemesh-cni-0:1.1.0-3.el8.x86_64",
"product": {
"name": "servicemesh-cni-0:1.1.0-3.el8.x86_64",
"product_id": "servicemesh-cni-0:1.1.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ior-0:1.1.0-3.el8.x86_64",
"product": {
"name": "ior-0:1.1.0-3.el8.x86_64",
"product_id": "ior-0:1.1.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"product_id": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"product": {
"name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"product_id": "servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"product": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"product_id": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"product": {
"name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"product_id": "servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-citadel@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-galley-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-galley-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-galley-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-galley@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-sidecar-injector@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:1.1.0-9.el8.x86_64",
"product": {
"name": "servicemesh-operator-0:1.1.0-9.el8.x86_64",
"product_id": "servicemesh-operator-0:1.1.0-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"product": {
"name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"product_id": "kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "servicemesh-cni-0:1.1.0-3.el8.src",
"product": {
"name": "servicemesh-cni-0:1.1.0-3.el8.src",
"product_id": "servicemesh-cni-0:1.1.0-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "ior-0:1.1.0-3.el8.src",
"product": {
"name": "ior-0:1.1.0-3.el8.src",
"product_id": "ior-0:1.1.0-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-3.el8.src",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.src",
"product_id": "servicemesh-prometheus-0:2.14.0-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-2.el8.src",
"product": {
"name": "servicemesh-grafana-0:6.4.3-2.el8.src",
"product_id": "servicemesh-grafana-0:6.4.3-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:1.1.0-4.el8.src",
"product": {
"name": "servicemesh-proxy-0:1.1.0-4.el8.src",
"product_id": "servicemesh-proxy-0:1.1.0-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:1.1.0-5.el8.src",
"product": {
"name": "servicemesh-0:1.1.0-5.el8.src",
"product_id": "servicemesh-0:1.1.0-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:1.1.0-9.el8.src",
"product": {
"name": "servicemesh-operator-0:1.1.0-9.el8.src",
"product_id": "servicemesh-operator-0:1.1.0-9.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kiali-0:v1.12.7.redhat1-1.el7.src",
"product": {
"name": "kiali-0:v1.12.7.redhat1-1.el7.src",
"product_id": "kiali-0:v1.12.7.redhat1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.12.7.redhat1-1.el7.src as a component of Red Hat OpenShift Service Mesh 1.1",
"product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src"
},
"product_reference": "kiali-0:v1.12.7.redhat1-1.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64 as a component of Red Hat OpenShift Service Mesh 1.1",
"product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64"
},
"product_reference": "kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ior-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src"
},
"product_reference": "ior-0:1.1.0-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ior-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64"
},
"product_reference": "ior-0:1.1.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:1.1.0-5.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src"
},
"product_reference": "servicemesh-0:1.1.0-5.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src"
},
"product_reference": "servicemesh-cni-0:1.1.0-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64"
},
"product_reference": "servicemesh-cni-0:1.1.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-galley-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-galley-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-2.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src"
},
"product_reference": "servicemesh-grafana-0:6.4.3-2.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64"
},
"product_reference": "servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64"
},
"product_reference": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:1.1.0-9.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src"
},
"product_reference": "servicemesh-operator-0:1.1.0-9.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:1.1.0-9.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64"
},
"product_reference": "servicemesh-operator-0:1.1.0-9.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:1.1.0-4.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src"
},
"product_reference": "servicemesh-proxy-0:1.1.0-4.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64"
},
"product_reference": "servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14993",
"cwe": {
"id": "CWE-185",
"name": "Incorrect Regular Expression"
},
"discovery_date": "2019-08-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1759816"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Istio in versions prior to 1.1.13 and 1.2.4. Regular expressions for long URIs are mishandled leading to a denial of service during the use of JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "istio/envoy: mishandling regular expressions for long URIs leading to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src",
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14993"
},
{
"category": "external",
"summary": "RHBZ#1759816",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759816"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14993"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993"
},
{
"category": "external",
"summary": "https://istio.io/news/2019/istio-security-003-004/",
"url": "https://istio.io/news/2019/istio-security-003-004/"
}
],
"release_date": "2019-10-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-04-08T21:46:21+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src",
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2020:1416"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src",
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "istio/envoy: mishandling regular expressions for long URIs leading to DoS"
},
{
"cve": "CVE-2019-15225",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1765655"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Envoy through version 1.11.1. Users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: crafted request with long URI allows remote attacker to cause denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src",
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-15225"
},
{
"category": "external",
"summary": "RHBZ#1765655",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765655"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-15225",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15225"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225"
}
],
"release_date": "2019-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-04-08T21:46:21+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src",
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2020:1416"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src",
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "envoy: crafted request with long URI allows remote attacker to cause denial of service"
}
]
}
RHEA-2020_1416
Vulnerability from csaf_redhat - Published: 2020-04-08 21:46 - Updated: 2024-11-22 14:43Summary
Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs
Notes
Topic
Red Hat OpenShift Service Mesh 1.1.0.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
The OpenShift Service Mesh release notes provide information on the features and known issues:
https://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html
This advisory covers the RPM packages for the release.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Service Mesh 1.1.0.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/4.3/service_mesh/servicemesh-release-notes.html\n\nThis advisory covers the RPM packages for the release.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2020:1416",
"url": "https://access.redhat.com/errata/RHEA-2020:1416"
},
{
"category": "external",
"summary": "MAISTRA-907",
"url": "https://issues.redhat.com/browse/MAISTRA-907"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhea-2020_1416.json"
}
],
"title": "Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.1.0 RPMs",
"tracking": {
"current_release_date": "2024-11-22T14:43:46+00:00",
"generator": {
"date": "2024-11-22T14:43:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHEA-2020:1416",
"initial_release_date": "2020-04-08T21:46:21+00:00",
"revision_history": [
{
"date": "2020-04-08T21:46:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-04-08T21:46:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T14:43:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Service Mesh 1.1",
"product": {
"name": "OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:1.1::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Service Mesh 1.1",
"product": {
"name": "Red Hat OpenShift Service Mesh 1.1",
"product_id": "7Server-RH7-RHOSSM-1.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:1.1::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "servicemesh-cni-0:1.1.0-3.el8.x86_64",
"product": {
"name": "servicemesh-cni-0:1.1.0-3.el8.x86_64",
"product_id": "servicemesh-cni-0:1.1.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ior-0:1.1.0-3.el8.x86_64",
"product": {
"name": "ior-0:1.1.0-3.el8.x86_64",
"product_id": "ior-0:1.1.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"product_id": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"product": {
"name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"product_id": "servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"product": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"product_id": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"product": {
"name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"product_id": "servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-citadel@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-galley-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-galley-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-galley-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-galley@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64",
"product": {
"name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64",
"product_id": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-sidecar-injector@1.1.0-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:1.1.0-9.el8.x86_64",
"product": {
"name": "servicemesh-operator-0:1.1.0-9.el8.x86_64",
"product_id": "servicemesh-operator-0:1.1.0-9.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"product": {
"name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"product_id": "kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "servicemesh-cni-0:1.1.0-3.el8.src",
"product": {
"name": "servicemesh-cni-0:1.1.0-3.el8.src",
"product_id": "servicemesh-cni-0:1.1.0-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@1.1.0-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "ior-0:1.1.0-3.el8.src",
"product": {
"name": "ior-0:1.1.0-3.el8.src",
"product_id": "ior-0:1.1.0-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ior@1.1.0-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-3.el8.src",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.src",
"product_id": "servicemesh-prometheus-0:2.14.0-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-2.el8.src",
"product": {
"name": "servicemesh-grafana-0:6.4.3-2.el8.src",
"product_id": "servicemesh-grafana-0:6.4.3-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:1.1.0-4.el8.src",
"product": {
"name": "servicemesh-proxy-0:1.1.0-4.el8.src",
"product_id": "servicemesh-proxy-0:1.1.0-4.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.0-4.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:1.1.0-5.el8.src",
"product": {
"name": "servicemesh-0:1.1.0-5.el8.src",
"product_id": "servicemesh-0:1.1.0-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@1.1.0-5.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:1.1.0-9.el8.src",
"product": {
"name": "servicemesh-operator-0:1.1.0-9.el8.src",
"product_id": "servicemesh-operator-0:1.1.0-9.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@1.1.0-9.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kiali-0:v1.12.7.redhat1-1.el7.src",
"product": {
"name": "kiali-0:v1.12.7.redhat1-1.el7.src",
"product_id": "kiali-0:v1.12.7.redhat1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.12.7.redhat1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.12.7.redhat1-1.el7.src as a component of Red Hat OpenShift Service Mesh 1.1",
"product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src"
},
"product_reference": "kiali-0:v1.12.7.redhat1-1.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.12.7.redhat1-1.el7.x86_64 as a component of Red Hat OpenShift Service Mesh 1.1",
"product_id": "7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64"
},
"product_reference": "kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ior-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src"
},
"product_reference": "ior-0:1.1.0-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ior-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64"
},
"product_reference": "ior-0:1.1.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:1.1.0-5.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src"
},
"product_reference": "servicemesh-0:1.1.0-5.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-citadel-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:1.1.0-3.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src"
},
"product_reference": "servicemesh-cni-0:1.1.0-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:1.1.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64"
},
"product_reference": "servicemesh-cni-0:1.1.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-galley-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-galley-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-2.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src"
},
"product_reference": "servicemesh-grafana-0:6.4.3-2.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64"
},
"product_reference": "servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64"
},
"product_reference": "servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:1.1.0-9.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src"
},
"product_reference": "servicemesh-operator-0:1.1.0-9.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:1.1.0-9.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64"
},
"product_reference": "servicemesh-operator-0:1.1.0-9.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:1.1.0-4.el8.src as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src"
},
"product_reference": "servicemesh-proxy-0:1.1.0-4.el8.src",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:1.1.0-4.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64"
},
"product_reference": "servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64 as a component of OpenShift Service Mesh 1.1",
"product_id": "8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
},
"product_reference": "servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-1.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14993",
"cwe": {
"id": "CWE-185",
"name": "Incorrect Regular Expression"
},
"discovery_date": "2019-08-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1759816"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Istio in versions prior to 1.1.13 and 1.2.4. Regular expressions for long URIs are mishandled leading to a denial of service during the use of JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "istio/envoy: mishandling regular expressions for long URIs leading to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src",
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14993"
},
{
"category": "external",
"summary": "RHBZ#1759816",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759816"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14993"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993"
},
{
"category": "external",
"summary": "https://istio.io/news/2019/istio-security-003-004/",
"url": "https://istio.io/news/2019/istio-security-003-004/"
}
],
"release_date": "2019-10-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-04-08T21:46:21+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src",
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2020:1416"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src",
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "istio/envoy: mishandling regular expressions for long URIs leading to DoS"
},
{
"cve": "CVE-2019-15225",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1765655"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Envoy through version 1.11.1. Users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "envoy: crafted request with long URI allows remote attacker to cause denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src",
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-15225"
},
{
"category": "external",
"summary": "RHBZ#1765655",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765655"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-15225",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15225"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15225"
}
],
"release_date": "2019-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-04-08T21:46:21+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src",
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2020:1416"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.src",
"7Server-RH7-RHOSSM-1.1:kiali-0:v1.12.7.redhat1-1.el7.x86_64",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:ior-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.src",
"8Base-OSSM-1.1:servicemesh-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-citadel-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-cni-0:1.1.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-galley-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.src",
"8Base-OSSM-1.1:servicemesh-grafana-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-grafana-prometheus-0:6.4.3-2.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-istioctl-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixc-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-mixs-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.src",
"8Base-OSSM-1.1:servicemesh-operator-0:1.1.0-9.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-agent-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-pilot-discovery-0:1.1.0-5.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.src",
"8Base-OSSM-1.1:servicemesh-prometheus-0:2.14.0-3.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.src",
"8Base-OSSM-1.1:servicemesh-proxy-0:1.1.0-4.el8.x86_64",
"8Base-OSSM-1.1:servicemesh-sidecar-injector-0:1.1.0-5.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "envoy: crafted request with long URI allows remote attacker to cause denial of service"
}
]
}
GHSA-QCVW-82HH-GQ38
Vulnerability from github – Published: 2022-05-24 16:53 – Updated: 2023-07-17 21:05
VLAI?
Summary
Istio ReDoS Vulnerability
Details
Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.
Severity ?
7.5 (High)
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "istio.io/istio"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.1.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Go",
"name": "istio.io/istio"
},
"ranges": [
{
"events": [
{
"introduced": "1.2.0"
},
{
"fixed": "1.2.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2019-14993"
],
"database_specific": {
"cwe_ids": [
"CWE-185"
],
"github_reviewed": true,
"github_reviewed_at": "2023-07-17T21:05:13Z",
"nvd_published_at": "2019-08-13T18:15:00Z",
"severity": "HIGH"
},
"details": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.",
"id": "GHSA-qcvw-82hh-gq38",
"modified": "2023-07-17T21:05:13Z",
"published": "2022-05-24T16:53:16Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14993"
},
{
"type": "WEB",
"url": "https://github.com/envoyproxy/envoy/issues/7728"
},
{
"type": "WEB",
"url": "https://discuss.istio.io/t/upcoming-security-updates-in-istio-1-2-4-and-1-1-13/3383"
},
{
"type": "WEB",
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86164"
},
{
"type": "WEB",
"url": "https://istio.io/blog/2019/istio-security-003-004"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Istio ReDoS Vulnerability"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…