rhsa-2022_5004
Vulnerability from csaf_redhat
Published
2022-06-13 12:34
Modified
2024-11-13 23:45
Summary
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.3 security update

Notes

Topic
Red Hat OpenShift Service Mesh 2.1.3 has been released. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Service Mesh is a Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. This advisory covers the RPM packages for the release. Security Fix(es): * envoy: oauth filter allows trivial bypass (CVE-2022-29226) * envoy: Decompressors can be zip bombed (CVE-2022-29225) * envoy: oauth filter calls continueDecoding() from within decodeHeaders() (CVE-2022-29228) * golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772) * golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773) * golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806) * envoy: Segfault in GrpcHealthCheckerImpl (CVE-2022-29224) * Istio: Unsafe memory access in metadata exchange (CVE-2022-31045) For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, see the CVE page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Critical"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat OpenShift Service Mesh 2.1.3 has been released.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Service Mesh is a Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThis advisory covers the RPM packages for the release.\n\nSecurity Fix(es):\n\n* envoy: oauth filter allows trivial bypass (CVE-2022-29226)\n* envoy: Decompressors can be zip bombed (CVE-2022-29225)\n* envoy: oauth filter calls continueDecoding() from within decodeHeaders() (CVE-2022-29228)\n* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)\n* golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)\n* golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806)\n* envoy: Segfault in GrpcHealthCheckerImpl (CVE-2022-29224)\n* Istio: Unsafe memory access in metadata exchange (CVE-2022-31045)\n\nFor more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, see the CVE page listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:5004",
        "url": "https://access.redhat.com/errata/RHSA-2022:5004"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#critical",
        "url": "https://access.redhat.com/security/updates/classification/#critical"
      },
      {
        "category": "external",
        "summary": "https://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html",
        "url": "https://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html"
      },
      {
        "category": "external",
        "summary": "2053429",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429"
      },
      {
        "category": "external",
        "summary": "2053532",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532"
      },
      {
        "category": "external",
        "summary": "2053541",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541"
      },
      {
        "category": "external",
        "summary": "2088737",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088737"
      },
      {
        "category": "external",
        "summary": "2088738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088738"
      },
      {
        "category": "external",
        "summary": "2088739",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088739"
      },
      {
        "category": "external",
        "summary": "2088740",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088740"
      },
      {
        "category": "external",
        "summary": "2088819",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088819"
      },
      {
        "category": "external",
        "summary": "OSSM-1107",
        "url": "https://issues.redhat.com/browse/OSSM-1107"
      },
      {
        "category": "external",
        "summary": "OSSM-1614",
        "url": "https://issues.redhat.com/browse/OSSM-1614"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5004.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.3 security update",
    "tracking": {
      "current_release_date": "2024-11-13T23:45:27+00:00",
      "generator": {
        "date": "2024-11-13T23:45:27+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.0"
        }
      },
      "id": "RHSA-2022:5004",
      "initial_release_date": "2022-06-13T12:34:12+00:00",
      "revision_history": [
        {
          "date": "2022-06-13T12:34:12+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-06-13T12:34:12+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-13T23:45:27+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "OpenShift Service Mesh 2.1",
                "product": {
                  "name": "OpenShift Service Mesh 2.1",
                  "product_id": "8Base-OSSM-2.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:service_mesh:2.1::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Service Mesh"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "servicemesh-prometheus-0:2.23.0-7.el8.src",
                "product": {
                  "name": "servicemesh-prometheus-0:2.23.0-7.el8.src",
                  "product_id": "servicemesh-prometheus-0:2.23.0-7.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-7.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-proxy-0:2.1.3-1.el8.src",
                "product": {
                  "name": "servicemesh-proxy-0:2.1.3-1.el8.src",
                  "product_id": "servicemesh-proxy-0:2.1.3-1.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.3-1.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-0:2.1.3-1.el8.src",
                "product": {
                  "name": "servicemesh-0:2.1.3-1.el8.src",
                  "product_id": "servicemesh-0:2.1.3-1.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh@2.1.3-1.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-ratelimit-0:2.1.3-1.el8.src",
                "product": {
                  "name": "servicemesh-ratelimit-0:2.1.3-1.el8.src",
                  "product_id": "servicemesh-ratelimit-0:2.1.3-1.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.3-1.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-operator-0:2.1.3-2.el8.src",
                "product": {
                  "name": "servicemesh-operator-0:2.1.3-2.el8.src",
                  "product_id": "servicemesh-operator-0:2.1.3-2.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.3-2.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
                "product": {
                  "name": "servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
                  "product_id": "servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-7.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-proxy-0:2.1.3-1.el8.x86_64",
                "product": {
                  "name": "servicemesh-proxy-0:2.1.3-1.el8.x86_64",
                  "product_id": "servicemesh-proxy-0:2.1.3-1.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.3-1.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
                "product": {
                  "name": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
                  "product_id": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-proxy-debugsource@2.1.3-1.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
                "product": {
                  "name": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
                  "product_id": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-proxy-debuginfo@2.1.3-1.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-0:2.1.3-1.el8.x86_64",
                "product": {
                  "name": "servicemesh-0:2.1.3-1.el8.x86_64",
                  "product_id": "servicemesh-0:2.1.3-1.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh@2.1.3-1.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-cni-0:2.1.3-1.el8.x86_64",
                "product": {
                  "name": "servicemesh-cni-0:2.1.3-1.el8.x86_64",
                  "product_id": "servicemesh-cni-0:2.1.3-1.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-cni@2.1.3-1.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
                "product": {
                  "name": "servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
                  "product_id": "servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.1.3-1.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
                "product": {
                  "name": "servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
                  "product_id": "servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.1.3-1.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-ratelimit-0:2.1.3-1.el8.x86_64",
                "product": {
                  "name": "servicemesh-ratelimit-0:2.1.3-1.el8.x86_64",
                  "product_id": "servicemesh-ratelimit-0:2.1.3-1.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.3-1.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-operator-0:2.1.3-2.el8.x86_64",
                "product": {
                  "name": "servicemesh-operator-0:2.1.3-2.el8.x86_64",
                  "product_id": "servicemesh-operator-0:2.1.3-2.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.3-2.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
                "product": {
                  "name": "servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
                  "product_id": "servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-7.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
                "product": {
                  "name": "servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
                  "product_id": "servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.3-1.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
                "product": {
                  "name": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
                  "product_id": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-proxy-debugsource@2.1.3-1.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
                "product": {
                  "name": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
                  "product_id": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-proxy-debuginfo@2.1.3-1.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-0:2.1.3-1.el8.ppc64le",
                "product": {
                  "name": "servicemesh-0:2.1.3-1.el8.ppc64le",
                  "product_id": "servicemesh-0:2.1.3-1.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh@2.1.3-1.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-cni-0:2.1.3-1.el8.ppc64le",
                "product": {
                  "name": "servicemesh-cni-0:2.1.3-1.el8.ppc64le",
                  "product_id": "servicemesh-cni-0:2.1.3-1.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-cni@2.1.3-1.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
                "product": {
                  "name": "servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
                  "product_id": "servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.1.3-1.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
                "product": {
                  "name": "servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
                  "product_id": "servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.1.3-1.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
                "product": {
                  "name": "servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
                  "product_id": "servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.3-1.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-operator-0:2.1.3-2.el8.ppc64le",
                "product": {
                  "name": "servicemesh-operator-0:2.1.3-2.el8.ppc64le",
                  "product_id": "servicemesh-operator-0:2.1.3-2.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.3-2.el8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "servicemesh-prometheus-0:2.23.0-7.el8.s390x",
                "product": {
                  "name": "servicemesh-prometheus-0:2.23.0-7.el8.s390x",
                  "product_id": "servicemesh-prometheus-0:2.23.0-7.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-7.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-proxy-0:2.1.3-1.el8.s390x",
                "product": {
                  "name": "servicemesh-proxy-0:2.1.3-1.el8.s390x",
                  "product_id": "servicemesh-proxy-0:2.1.3-1.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.3-1.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
                "product": {
                  "name": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
                  "product_id": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-proxy-debugsource@2.1.3-1.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
                "product": {
                  "name": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
                  "product_id": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-proxy-debuginfo@2.1.3-1.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-0:2.1.3-1.el8.s390x",
                "product": {
                  "name": "servicemesh-0:2.1.3-1.el8.s390x",
                  "product_id": "servicemesh-0:2.1.3-1.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh@2.1.3-1.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-cni-0:2.1.3-1.el8.s390x",
                "product": {
                  "name": "servicemesh-cni-0:2.1.3-1.el8.s390x",
                  "product_id": "servicemesh-cni-0:2.1.3-1.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-cni@2.1.3-1.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
                "product": {
                  "name": "servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
                  "product_id": "servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.1.3-1.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
                "product": {
                  "name": "servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
                  "product_id": "servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.1.3-1.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
                "product": {
                  "name": "servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
                  "product_id": "servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.3-1.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "servicemesh-operator-0:2.1.3-2.el8.s390x",
                "product": {
                  "name": "servicemesh-operator-0:2.1.3-2.el8.s390x",
                  "product_id": "servicemesh-operator-0:2.1.3-2.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.3-2.el8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
                "product": {
                  "name": "servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
                  "product_id": "servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/servicemesh-proxy-wasm@2.1.3-1.el8?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-0:2.1.3-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le"
        },
        "product_reference": "servicemesh-0:2.1.3-1.el8.ppc64le",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-0:2.1.3-1.el8.s390x as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x"
        },
        "product_reference": "servicemesh-0:2.1.3-1.el8.s390x",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-0:2.1.3-1.el8.src as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src"
        },
        "product_reference": "servicemesh-0:2.1.3-1.el8.src",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-0:2.1.3-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64"
        },
        "product_reference": "servicemesh-0:2.1.3-1.el8.x86_64",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-cni-0:2.1.3-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le"
        },
        "product_reference": "servicemesh-cni-0:2.1.3-1.el8.ppc64le",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-cni-0:2.1.3-1.el8.s390x as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x"
        },
        "product_reference": "servicemesh-cni-0:2.1.3-1.el8.s390x",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-cni-0:2.1.3-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64"
        },
        "product_reference": "servicemesh-cni-0:2.1.3-1.el8.x86_64",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-operator-0:2.1.3-2.el8.ppc64le as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le"
        },
        "product_reference": "servicemesh-operator-0:2.1.3-2.el8.ppc64le",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-operator-0:2.1.3-2.el8.s390x as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x"
        },
        "product_reference": "servicemesh-operator-0:2.1.3-2.el8.s390x",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-operator-0:2.1.3-2.el8.src as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src"
        },
        "product_reference": "servicemesh-operator-0:2.1.3-2.el8.src",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-operator-0:2.1.3-2.el8.x86_64 as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64"
        },
        "product_reference": "servicemesh-operator-0:2.1.3-2.el8.x86_64",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le"
        },
        "product_reference": "servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-pilot-agent-0:2.1.3-1.el8.s390x as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x"
        },
        "product_reference": "servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64"
        },
        "product_reference": "servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le"
        },
        "product_reference": "servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x"
        },
        "product_reference": "servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64"
        },
        "product_reference": "servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-prometheus-0:2.23.0-7.el8.ppc64le as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le"
        },
        "product_reference": "servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-prometheus-0:2.23.0-7.el8.s390x as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x"
        },
        "product_reference": "servicemesh-prometheus-0:2.23.0-7.el8.s390x",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-prometheus-0:2.23.0-7.el8.src as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src"
        },
        "product_reference": "servicemesh-prometheus-0:2.23.0-7.el8.src",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-prometheus-0:2.23.0-7.el8.x86_64 as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64"
        },
        "product_reference": "servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-proxy-0:2.1.3-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le"
        },
        "product_reference": "servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-proxy-0:2.1.3-1.el8.s390x as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x"
        },
        "product_reference": "servicemesh-proxy-0:2.1.3-1.el8.s390x",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-proxy-0:2.1.3-1.el8.src as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src"
        },
        "product_reference": "servicemesh-proxy-0:2.1.3-1.el8.src",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-proxy-0:2.1.3-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64"
        },
        "product_reference": "servicemesh-proxy-0:2.1.3-1.el8.x86_64",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le"
        },
        "product_reference": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x"
        },
        "product_reference": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64"
        },
        "product_reference": "servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le"
        },
        "product_reference": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x"
        },
        "product_reference": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64"
        },
        "product_reference": "servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch"
        },
        "product_reference": "servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le"
        },
        "product_reference": "servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-ratelimit-0:2.1.3-1.el8.s390x as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x"
        },
        "product_reference": "servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-ratelimit-0:2.1.3-1.el8.src as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src"
        },
        "product_reference": "servicemesh-ratelimit-0:2.1.3-1.el8.src",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "servicemesh-ratelimit-0:2.1.3-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1",
          "product_id": "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
        },
        "product_reference": "servicemesh-ratelimit-0:2.1.3-1.el8.x86_64",
        "relates_to_product_reference": "8Base-OSSM-2.1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-23772",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2022-02-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2053532"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the big package of the math library in golang. The Rat.SetString could cause an overflow, and if left unhandled, it could lead to excessive memory use. This issue could allow a remote attacker to impact the availability of the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Enterprise Linux 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-23772"
        },
        {
          "category": "external",
          "summary": "RHBZ#2053532",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23772",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ",
          "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ"
        }
      ],
      "release_date": "2022-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-06-13T12:34:12+00:00",
          "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues. See the link in the References section.",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:5004"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString"
    },
    {
      "cve": "CVE-2022-23773",
      "cwe": {
        "id": "CWE-1220",
        "name": "Insufficient Granularity of Access Control"
      },
      "discovery_date": "2022-02-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2053541"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the go package of the cmd library in golang. The go command could be tricked into accepting a branch, which resembles a version tag. This issue could allow a remote unauthenticated attacker to bypass security restrictions and introduce invalid or incorrect tags, reducing the integrity of the environment.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-23773"
        },
        {
          "category": "external",
          "summary": "RHBZ#2053541",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23773",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ",
          "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-06-13T12:34:12+00:00",
          "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues. See the link in the References section.",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:5004"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control"
    },
    {
      "cve": "CVE-2022-23806",
      "cwe": {
        "id": "CWE-252",
        "name": "Unchecked Return Value"
      },
      "discovery_date": "2022-02-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2053429"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the elliptic package of the crypto library in golang when the IsOnCurve function could return true for invalid field elements. This flaw allows an attacker to take advantage of this undefined behavior, affecting the availability and integrity of the resource.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Enterprise Linux 8 and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. The issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7; hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16 \u0026 1.17), will not be addressed in future updates as shipped only in RHEL-7, hence, marked as Out-of-Support-Scope.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-23806"
        },
        {
          "category": "external",
          "summary": "RHBZ#2053429",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23806",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ",
          "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-06-13T12:34:12+00:00",
          "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues. See the link in the References section.",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:5004"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "the Envoy security team"
          ]
        }
      ],
      "cve": "CVE-2022-29224",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-05-20T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2088738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Envoy. This flaw allows an attacker who controls an upstream host and also controls service discovery of that host (via DNS, the EDS API, etc.) to crash Envoy by forcing the removal of the host from service discovery and then failing the gRPC health check request. This issue crashes Envoy via a NULL pointer dereference.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "envoy: Segfault in GrpcHealthCheckerImpl",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch"
        ],
        "known_not_affected": [
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-29224"
        },
        {
          "category": "external",
          "summary": "RHBZ#2088738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29224",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-29224"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29224",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29224"
        },
        {
          "category": "external",
          "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-m4j9-86g3-8f49",
          "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-m4j9-86g3-8f49"
        }
      ],
      "release_date": "2022-06-09T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-06-13T12:34:12+00:00",
          "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues. See the link in the References section.",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:5004"
        },
        {
          "category": "workaround",
          "details": "Disable gRPC health checking and/or replace it with a different health checking type.",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "envoy: Segfault in GrpcHealthCheckerImpl"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "the Envoy security team"
          ]
        }
      ],
      "cve": "CVE-2022-29225",
      "cwe": {
        "id": "CWE-409",
        "name": "Improper Handling of Highly Compressed Data (Data Amplification)"
      },
      "discovery_date": "2022-05-20T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2088737"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Envoy. A specifically constructed HTTP body delivered by an untrusted downstream or upstream peer whose decompressed size is dramatically larger than the compressed size can be sent by an attacker to cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "envoy: Decompressors can be zip bombed",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch"
        ],
        "known_not_affected": [
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-29225"
        },
        {
          "category": "external",
          "summary": "RHBZ#2088737",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088737"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29225",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-29225"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29225",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29225"
        },
        {
          "category": "external",
          "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-75hv-2jjj-89hh",
          "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-75hv-2jjj-89hh"
        }
      ],
      "release_date": "2022-06-09T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-06-13T12:34:12+00:00",
          "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues. See the link in the References section.",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:5004"
        },
        {
          "category": "workaround",
          "details": "This can be mitigated by disabling decompression in Envoy.",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "envoy: Decompressors can be zip bombed"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "the Envoy security team"
          ]
        }
      ],
      "cve": "CVE-2022-29226",
      "cwe": {
        "id": "CWE-303",
        "name": "Incorrect Implementation of Authentication Algorithm"
      },
      "discovery_date": "2022-05-20T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2088739"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Envoy. The OAuth filter does not include an implementation for validating access tokens, allowing remote attackers to bypass authentication to Envoy by providing any token value.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "envoy: oauth filter allows trivial bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch"
        ],
        "known_not_affected": [
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-29226"
        },
        {
          "category": "external",
          "summary": "RHBZ#2088739",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088739"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29226",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-29226"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29226",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29226"
        },
        {
          "category": "external",
          "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-h45c-2f94-prxh",
          "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-h45c-2f94-prxh"
        }
      ],
      "release_date": "2022-06-09T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-06-13T12:34:12+00:00",
          "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues. See the link in the References section.",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:5004"
        },
        {
          "category": "workaround",
          "details": "There is no known mitigation for this flaw.",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 10.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "envoy: oauth filter allows trivial bypass"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "the Envoy security team"
          ]
        }
      ],
      "cve": "CVE-2022-29228",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "discovery_date": "2022-05-20T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2088740"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Envoy. The OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "envoy: oauth filter calls continueDecoding() from within decodeHeaders()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch"
        ],
        "known_not_affected": [
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-29228"
        },
        {
          "category": "external",
          "summary": "RHBZ#2088740",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088740"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29228",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-29228"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29228",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29228"
        },
        {
          "category": "external",
          "summary": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-rww6-8h7g-8jf6",
          "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-rww6-8h7g-8jf6"
        }
      ],
      "release_date": "2022-06-09T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-06-13T12:34:12+00:00",
          "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues. See the link in the References section.",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:5004"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "envoy: oauth filter calls continueDecoding() from within decodeHeaders()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "the Istio Product Security team"
          ]
        }
      ],
      "cve": "CVE-2022-31045",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-05-20T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
            "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
            "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2088819"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Istio. Memory access violation of ill-formed headers sent to Envoy in certain configurations can lead to unexpected memory access, resulting in undefined behavior or crashing.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Istio: Unsafe memory access in metadata exchange.",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64"
        ],
        "known_not_affected": [
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.src",
          "8Base-OSSM-2.1:servicemesh-operator-0:2.1.3-2.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.src",
          "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-7.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.3-1.el8.x86_64",
          "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.3-1.el8.noarch",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.ppc64le",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.s390x",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.src",
          "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.3-1.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-31045"
        },
        {
          "category": "external",
          "summary": "RHBZ#2088819",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088819"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31045",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-31045"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31045",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31045"
        },
        {
          "category": "external",
          "summary": "https://github.com/istio/istio/security/advisories/GHSA-xwx5-5c9g-x68x",
          "url": "https://github.com/istio/istio/security/advisories/GHSA-xwx5-5c9g-x68x"
        },
        {
          "category": "external",
          "summary": "https://istio.io/latest/news/security/istio-security-2022-005/#cve-2022-31045",
          "url": "https://istio.io/latest/news/security/istio-security-2022-005/#cve-2022-31045"
        }
      ],
      "release_date": "2022-06-09T22:35:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-06-13T12:34:12+00:00",
          "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues. See the link in the References section.",
          "product_ids": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:5004"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.src",
            "8Base-OSSM-2.1:servicemesh-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-cni-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.3-1.el8.x86_64",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.ppc64le",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.s390x",
            "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.3-1.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Istio: Unsafe memory access in metadata exchange."
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.