rhsa-2023_4113
Vulnerability from csaf_redhat
Published
2023-07-17 16:29
Modified
2024-11-06 09:20
Summary
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.5 security update
Notes
Topic
Red Hat OpenShift Service Mesh 2.3.5 Containers
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
Security Fix(es):
* openshift: OCP & FIPS mode (CVE-2023-3089)
* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Service Mesh 2.3.5 Containers\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nSecurity Fix(es):\n\n* openshift: OCP \u0026 FIPS mode (CVE-2023-3089)\n\n* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4113", "url": "https://access.redhat.com/errata/RHSA-2023:4113" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-001" }, { "category": "external", "summary": "2178358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358" }, { "category": "external", "summary": "2212085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212085" }, { "category": "external", "summary": "OSSM-4290", "url": "https://issues.redhat.com/browse/OSSM-4290" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4113.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.5 security update", "tracking": { "current_release_date": "2024-11-06T09:20:22+00:00", "generator": { "date": "2024-11-06T09:20:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2023:4113", "initial_release_date": "2023-07-17T16:29:42+00:00", "revision_history": [ { "date": "2023-07-17T16:29:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-07-17T16:29:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T09:20:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHOSSM 2.3 for RHEL 8", "product": { "name": "RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:2.3::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/istio-cni-rhel8@sha256:8c14b7863467e814c833fa278d6b0be058b706b6ddd2b8bf84d6054cd354dc7a_ppc64le", "product": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:8c14b7863467e814c833fa278d6b0be058b706b6ddd2b8bf84d6054cd354dc7a_ppc64le", "product_id": "openshift-service-mesh/istio-cni-rhel8@sha256:8c14b7863467e814c833fa278d6b0be058b706b6ddd2b8bf84d6054cd354dc7a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/istio-cni-rhel8@sha256:8c14b7863467e814c833fa278d6b0be058b706b6ddd2b8bf84d6054cd354dc7a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-cni-rhel8\u0026tag=2.3.5-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/grafana-rhel8@sha256:14bfa79954caee54a6d23683da3614cc251b1ec4e08303e3ec4217ee322c043f_ppc64le", "product": { "name": "openshift-service-mesh/grafana-rhel8@sha256:14bfa79954caee54a6d23683da3614cc251b1ec4e08303e3ec4217ee322c043f_ppc64le", "product_id": "openshift-service-mesh/grafana-rhel8@sha256:14bfa79954caee54a6d23683da3614cc251b1ec4e08303e3ec4217ee322c043f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel8@sha256:14bfa79954caee54a6d23683da3614cc251b1ec4e08303e3ec4217ee322c043f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/grafana-rhel8\u0026tag=2.3.5-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a_ppc64le", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a_ppc64le", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.57.10-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:408c3da264aa721610fc9672946dbb22ce494847cec8d31b4100cf86c5b55a64_ppc64le", "product": { "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:408c3da264aa721610fc9672946dbb22ce494847cec8d31b4100cf86c5b55a64_ppc64le", "product_id": "openshift-service-mesh/istio-must-gather-rhel8@sha256:408c3da264aa721610fc9672946dbb22ce494847cec8d31b4100cf86c5b55a64_ppc64le", "product_identification_helper": { "purl": "pkg:oci/istio-must-gather-rhel8@sha256:408c3da264aa721610fc9672946dbb22ce494847cec8d31b4100cf86c5b55a64?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel8\u0026tag=2.3.5-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/pilot-rhel8@sha256:fcab427703c41e5e821825e839099856aa7c4c001007d8d12e0ac8692e5644da_ppc64le", "product": { "name": "openshift-service-mesh/pilot-rhel8@sha256:fcab427703c41e5e821825e839099856aa7c4c001007d8d12e0ac8692e5644da_ppc64le", "product_id": "openshift-service-mesh/pilot-rhel8@sha256:fcab427703c41e5e821825e839099856aa7c4c001007d8d12e0ac8692e5644da_ppc64le", "product_identification_helper": { "purl": "pkg:oci/pilot-rhel8@sha256:fcab427703c41e5e821825e839099856aa7c4c001007d8d12e0ac8692e5644da?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/pilot-rhel8\u0026tag=2.3.5-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/prometheus-rhel8@sha256:33abe74b18c6bea46a196143ad0b3d3885b010e3cb764b9ebcc95ee24ee61963_ppc64le", "product": { "name": "openshift-service-mesh/prometheus-rhel8@sha256:33abe74b18c6bea46a196143ad0b3d3885b010e3cb764b9ebcc95ee24ee61963_ppc64le", "product_id": "openshift-service-mesh/prometheus-rhel8@sha256:33abe74b18c6bea46a196143ad0b3d3885b010e3cb764b9ebcc95ee24ee61963_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:33abe74b18c6bea46a196143ad0b3d3885b010e3cb764b9ebcc95ee24ee61963?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/prometheus-rhel8\u0026tag=2.3.5-4" } } }, { "category": "product_version", "name": "openshift-service-mesh/proxyv2-rhel8@sha256:300d87447c106d9762bfb3ef41adc0d419514b79eb8ee67014e9e894f2177b9a_ppc64le", "product": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:300d87447c106d9762bfb3ef41adc0d419514b79eb8ee67014e9e894f2177b9a_ppc64le", "product_id": "openshift-service-mesh/proxyv2-rhel8@sha256:300d87447c106d9762bfb3ef41adc0d419514b79eb8ee67014e9e894f2177b9a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/proxyv2-rhel8@sha256:300d87447c106d9762bfb3ef41adc0d419514b79eb8ee67014e9e894f2177b9a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/proxyv2-rhel8\u0026tag=2.3.5-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/ratelimit-rhel8@sha256:894c1fb3feaa27fb86ed80f648f09d6fe2ee4495977be0c776fead5b2bdee621_ppc64le", "product": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:894c1fb3feaa27fb86ed80f648f09d6fe2ee4495977be0c776fead5b2bdee621_ppc64le", "product_id": "openshift-service-mesh/ratelimit-rhel8@sha256:894c1fb3feaa27fb86ed80f648f09d6fe2ee4495977be0c776fead5b2bdee621_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ratelimit-rhel8@sha256:894c1fb3feaa27fb86ed80f648f09d6fe2ee4495977be0c776fead5b2bdee621?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/ratelimit-rhel8\u0026tag=2.3.5-3" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/istio-cni-rhel8@sha256:afbd6f41156f3f0143b2a65972b15400d0cced3b8e19af16558b85b4c452f328_s390x", "product": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:afbd6f41156f3f0143b2a65972b15400d0cced3b8e19af16558b85b4c452f328_s390x", "product_id": "openshift-service-mesh/istio-cni-rhel8@sha256:afbd6f41156f3f0143b2a65972b15400d0cced3b8e19af16558b85b4c452f328_s390x", "product_identification_helper": { "purl": "pkg:oci/istio-cni-rhel8@sha256:afbd6f41156f3f0143b2a65972b15400d0cced3b8e19af16558b85b4c452f328?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-cni-rhel8\u0026tag=2.3.5-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/grafana-rhel8@sha256:cd047c9fcde218dd4bc7a673f7e027039e43ef67d8277517905afd25513cd51a_s390x", "product": { "name": "openshift-service-mesh/grafana-rhel8@sha256:cd047c9fcde218dd4bc7a673f7e027039e43ef67d8277517905afd25513cd51a_s390x", "product_id": "openshift-service-mesh/grafana-rhel8@sha256:cd047c9fcde218dd4bc7a673f7e027039e43ef67d8277517905afd25513cd51a_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel8@sha256:cd047c9fcde218dd4bc7a673f7e027039e43ef67d8277517905afd25513cd51a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/grafana-rhel8\u0026tag=2.3.5-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d_s390x", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d_s390x", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d_s390x", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.57.10-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:a061c7046ac2b62c60e953d21e35781ac26423edc079060f98d0589b47ca681d_s390x", "product": { "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:a061c7046ac2b62c60e953d21e35781ac26423edc079060f98d0589b47ca681d_s390x", "product_id": "openshift-service-mesh/istio-must-gather-rhel8@sha256:a061c7046ac2b62c60e953d21e35781ac26423edc079060f98d0589b47ca681d_s390x", "product_identification_helper": { "purl": "pkg:oci/istio-must-gather-rhel8@sha256:a061c7046ac2b62c60e953d21e35781ac26423edc079060f98d0589b47ca681d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel8\u0026tag=2.3.5-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/pilot-rhel8@sha256:a9b60e12998dbe1efa9e475f9cca96ee58436407ddc5888d83c3206d031b3c47_s390x", "product": { "name": "openshift-service-mesh/pilot-rhel8@sha256:a9b60e12998dbe1efa9e475f9cca96ee58436407ddc5888d83c3206d031b3c47_s390x", "product_id": "openshift-service-mesh/pilot-rhel8@sha256:a9b60e12998dbe1efa9e475f9cca96ee58436407ddc5888d83c3206d031b3c47_s390x", "product_identification_helper": { "purl": "pkg:oci/pilot-rhel8@sha256:a9b60e12998dbe1efa9e475f9cca96ee58436407ddc5888d83c3206d031b3c47?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/pilot-rhel8\u0026tag=2.3.5-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/prometheus-rhel8@sha256:ffd9f7dd13481cb6f9d67d83e845bae408e112d98be15fc8553a729ee48a3dfd_s390x", "product": { "name": "openshift-service-mesh/prometheus-rhel8@sha256:ffd9f7dd13481cb6f9d67d83e845bae408e112d98be15fc8553a729ee48a3dfd_s390x", "product_id": "openshift-service-mesh/prometheus-rhel8@sha256:ffd9f7dd13481cb6f9d67d83e845bae408e112d98be15fc8553a729ee48a3dfd_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:ffd9f7dd13481cb6f9d67d83e845bae408e112d98be15fc8553a729ee48a3dfd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/prometheus-rhel8\u0026tag=2.3.5-4" } } }, { "category": "product_version", "name": "openshift-service-mesh/proxyv2-rhel8@sha256:8a015e6ebe3b2cf86da429f154787ae9d92d1ef567b33ab47c6f33cb0633c4c4_s390x", "product": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:8a015e6ebe3b2cf86da429f154787ae9d92d1ef567b33ab47c6f33cb0633c4c4_s390x", "product_id": "openshift-service-mesh/proxyv2-rhel8@sha256:8a015e6ebe3b2cf86da429f154787ae9d92d1ef567b33ab47c6f33cb0633c4c4_s390x", "product_identification_helper": { "purl": "pkg:oci/proxyv2-rhel8@sha256:8a015e6ebe3b2cf86da429f154787ae9d92d1ef567b33ab47c6f33cb0633c4c4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/proxyv2-rhel8\u0026tag=2.3.5-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/ratelimit-rhel8@sha256:f47ff32671d8eadeedc569040b19ad04fb5e65c94523cff4625154d46839c156_s390x", "product": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:f47ff32671d8eadeedc569040b19ad04fb5e65c94523cff4625154d46839c156_s390x", "product_id": "openshift-service-mesh/ratelimit-rhel8@sha256:f47ff32671d8eadeedc569040b19ad04fb5e65c94523cff4625154d46839c156_s390x", "product_identification_helper": { "purl": "pkg:oci/ratelimit-rhel8@sha256:f47ff32671d8eadeedc569040b19ad04fb5e65c94523cff4625154d46839c156?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/ratelimit-rhel8\u0026tag=2.3.5-3" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/istio-cni-rhel8@sha256:411d0566a7c16469ded33d4f8b3b893d7f0ecc1363b033f711eaddacecca33d8_amd64", "product": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:411d0566a7c16469ded33d4f8b3b893d7f0ecc1363b033f711eaddacecca33d8_amd64", "product_id": "openshift-service-mesh/istio-cni-rhel8@sha256:411d0566a7c16469ded33d4f8b3b893d7f0ecc1363b033f711eaddacecca33d8_amd64", "product_identification_helper": { "purl": "pkg:oci/istio-cni-rhel8@sha256:411d0566a7c16469ded33d4f8b3b893d7f0ecc1363b033f711eaddacecca33d8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-cni-rhel8\u0026tag=2.3.5-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/grafana-rhel8@sha256:1abfbe1c3898a4085fae3c76a8a6831342b74680edc711c0688d48ab86ffa5a9_amd64", "product": { "name": "openshift-service-mesh/grafana-rhel8@sha256:1abfbe1c3898a4085fae3c76a8a6831342b74680edc711c0688d48ab86ffa5a9_amd64", "product_id": "openshift-service-mesh/grafana-rhel8@sha256:1abfbe1c3898a4085fae3c76a8a6831342b74680edc711c0688d48ab86ffa5a9_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel8@sha256:1abfbe1c3898a4085fae3c76a8a6831342b74680edc711c0688d48ab86ffa5a9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/grafana-rhel8\u0026tag=2.3.5-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2_amd64", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2_amd64", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2_amd64", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.57.10-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:68362d4be19bbae7d5d31ebb1328f4910957ea8b85120ee3e43c66c053a80810_amd64", "product": { "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:68362d4be19bbae7d5d31ebb1328f4910957ea8b85120ee3e43c66c053a80810_amd64", "product_id": "openshift-service-mesh/istio-must-gather-rhel8@sha256:68362d4be19bbae7d5d31ebb1328f4910957ea8b85120ee3e43c66c053a80810_amd64", "product_identification_helper": { "purl": "pkg:oci/istio-must-gather-rhel8@sha256:68362d4be19bbae7d5d31ebb1328f4910957ea8b85120ee3e43c66c053a80810?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel8\u0026tag=2.3.5-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/pilot-rhel8@sha256:fd90eda22dfaa7630540794a9ba30a38e81fc78269157ca92e002e8d384f8482_amd64", "product": { "name": "openshift-service-mesh/pilot-rhel8@sha256:fd90eda22dfaa7630540794a9ba30a38e81fc78269157ca92e002e8d384f8482_amd64", "product_id": "openshift-service-mesh/pilot-rhel8@sha256:fd90eda22dfaa7630540794a9ba30a38e81fc78269157ca92e002e8d384f8482_amd64", "product_identification_helper": { "purl": "pkg:oci/pilot-rhel8@sha256:fd90eda22dfaa7630540794a9ba30a38e81fc78269157ca92e002e8d384f8482?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/pilot-rhel8\u0026tag=2.3.5-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/prometheus-rhel8@sha256:6226c81f65bbd972517be75a5e58b12f0279d76913f937a29613d71db8f0a0f4_amd64", "product": { "name": "openshift-service-mesh/prometheus-rhel8@sha256:6226c81f65bbd972517be75a5e58b12f0279d76913f937a29613d71db8f0a0f4_amd64", "product_id": "openshift-service-mesh/prometheus-rhel8@sha256:6226c81f65bbd972517be75a5e58b12f0279d76913f937a29613d71db8f0a0f4_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:6226c81f65bbd972517be75a5e58b12f0279d76913f937a29613d71db8f0a0f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/prometheus-rhel8\u0026tag=2.3.5-4" } } }, { "category": "product_version", "name": "openshift-service-mesh/proxyv2-rhel8@sha256:0bd7384d18ac426b3cfc1916c86a58c492e43a82c5ae7469f5508a74b7ee0b92_amd64", "product": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:0bd7384d18ac426b3cfc1916c86a58c492e43a82c5ae7469f5508a74b7ee0b92_amd64", "product_id": "openshift-service-mesh/proxyv2-rhel8@sha256:0bd7384d18ac426b3cfc1916c86a58c492e43a82c5ae7469f5508a74b7ee0b92_amd64", "product_identification_helper": { "purl": "pkg:oci/proxyv2-rhel8@sha256:0bd7384d18ac426b3cfc1916c86a58c492e43a82c5ae7469f5508a74b7ee0b92?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/proxyv2-rhel8\u0026tag=2.3.5-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/ratelimit-rhel8@sha256:2e71b4d7783b783c2c0a292d78dff3048ecbd4c74c93a2f66c519b021a4c0b68_amd64", "product": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:2e71b4d7783b783c2c0a292d78dff3048ecbd4c74c93a2f66c519b021a4c0b68_amd64", "product_id": "openshift-service-mesh/ratelimit-rhel8@sha256:2e71b4d7783b783c2c0a292d78dff3048ecbd4c74c93a2f66c519b021a4c0b68_amd64", "product_identification_helper": { "purl": "pkg:oci/ratelimit-rhel8@sha256:2e71b4d7783b783c2c0a292d78dff3048ecbd4c74c93a2f66c519b021a4c0b68?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/ratelimit-rhel8\u0026tag=2.3.5-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/grafana-rhel8@sha256:14bfa79954caee54a6d23683da3614cc251b1ec4e08303e3ec4217ee322c043f_ppc64le as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:14bfa79954caee54a6d23683da3614cc251b1ec4e08303e3ec4217ee322c043f_ppc64le" }, "product_reference": "openshift-service-mesh/grafana-rhel8@sha256:14bfa79954caee54a6d23683da3614cc251b1ec4e08303e3ec4217ee322c043f_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/grafana-rhel8@sha256:1abfbe1c3898a4085fae3c76a8a6831342b74680edc711c0688d48ab86ffa5a9_amd64 as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:1abfbe1c3898a4085fae3c76a8a6831342b74680edc711c0688d48ab86ffa5a9_amd64" }, "product_reference": "openshift-service-mesh/grafana-rhel8@sha256:1abfbe1c3898a4085fae3c76a8a6831342b74680edc711c0688d48ab86ffa5a9_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/grafana-rhel8@sha256:cd047c9fcde218dd4bc7a673f7e027039e43ef67d8277517905afd25513cd51a_s390x as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:cd047c9fcde218dd4bc7a673f7e027039e43ef67d8277517905afd25513cd51a_s390x" }, "product_reference": "openshift-service-mesh/grafana-rhel8@sha256:cd047c9fcde218dd4bc7a673f7e027039e43ef67d8277517905afd25513cd51a_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:411d0566a7c16469ded33d4f8b3b893d7f0ecc1363b033f711eaddacecca33d8_amd64 as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:411d0566a7c16469ded33d4f8b3b893d7f0ecc1363b033f711eaddacecca33d8_amd64" }, "product_reference": "openshift-service-mesh/istio-cni-rhel8@sha256:411d0566a7c16469ded33d4f8b3b893d7f0ecc1363b033f711eaddacecca33d8_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:8c14b7863467e814c833fa278d6b0be058b706b6ddd2b8bf84d6054cd354dc7a_ppc64le as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:8c14b7863467e814c833fa278d6b0be058b706b6ddd2b8bf84d6054cd354dc7a_ppc64le" }, "product_reference": "openshift-service-mesh/istio-cni-rhel8@sha256:8c14b7863467e814c833fa278d6b0be058b706b6ddd2b8bf84d6054cd354dc7a_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:afbd6f41156f3f0143b2a65972b15400d0cced3b8e19af16558b85b4c452f328_s390x as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:afbd6f41156f3f0143b2a65972b15400d0cced3b8e19af16558b85b4c452f328_s390x" }, "product_reference": "openshift-service-mesh/istio-cni-rhel8@sha256:afbd6f41156f3f0143b2a65972b15400d0cced3b8e19af16558b85b4c452f328_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:408c3da264aa721610fc9672946dbb22ce494847cec8d31b4100cf86c5b55a64_ppc64le as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:408c3da264aa721610fc9672946dbb22ce494847cec8d31b4100cf86c5b55a64_ppc64le" }, "product_reference": "openshift-service-mesh/istio-must-gather-rhel8@sha256:408c3da264aa721610fc9672946dbb22ce494847cec8d31b4100cf86c5b55a64_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:68362d4be19bbae7d5d31ebb1328f4910957ea8b85120ee3e43c66c053a80810_amd64 as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:68362d4be19bbae7d5d31ebb1328f4910957ea8b85120ee3e43c66c053a80810_amd64" }, "product_reference": "openshift-service-mesh/istio-must-gather-rhel8@sha256:68362d4be19bbae7d5d31ebb1328f4910957ea8b85120ee3e43c66c053a80810_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:a061c7046ac2b62c60e953d21e35781ac26423edc079060f98d0589b47ca681d_s390x as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:a061c7046ac2b62c60e953d21e35781ac26423edc079060f98d0589b47ca681d_s390x" }, "product_reference": "openshift-service-mesh/istio-must-gather-rhel8@sha256:a061c7046ac2b62c60e953d21e35781ac26423edc079060f98d0589b47ca681d_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a_ppc64le as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a_ppc64le" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2_amd64 as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2_amd64" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d_s390x as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d_s390x" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/pilot-rhel8@sha256:a9b60e12998dbe1efa9e475f9cca96ee58436407ddc5888d83c3206d031b3c47_s390x as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:a9b60e12998dbe1efa9e475f9cca96ee58436407ddc5888d83c3206d031b3c47_s390x" }, "product_reference": "openshift-service-mesh/pilot-rhel8@sha256:a9b60e12998dbe1efa9e475f9cca96ee58436407ddc5888d83c3206d031b3c47_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/pilot-rhel8@sha256:fcab427703c41e5e821825e839099856aa7c4c001007d8d12e0ac8692e5644da_ppc64le as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fcab427703c41e5e821825e839099856aa7c4c001007d8d12e0ac8692e5644da_ppc64le" }, "product_reference": "openshift-service-mesh/pilot-rhel8@sha256:fcab427703c41e5e821825e839099856aa7c4c001007d8d12e0ac8692e5644da_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/pilot-rhel8@sha256:fd90eda22dfaa7630540794a9ba30a38e81fc78269157ca92e002e8d384f8482_amd64 as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fd90eda22dfaa7630540794a9ba30a38e81fc78269157ca92e002e8d384f8482_amd64" }, "product_reference": "openshift-service-mesh/pilot-rhel8@sha256:fd90eda22dfaa7630540794a9ba30a38e81fc78269157ca92e002e8d384f8482_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/prometheus-rhel8@sha256:33abe74b18c6bea46a196143ad0b3d3885b010e3cb764b9ebcc95ee24ee61963_ppc64le as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:33abe74b18c6bea46a196143ad0b3d3885b010e3cb764b9ebcc95ee24ee61963_ppc64le" }, "product_reference": "openshift-service-mesh/prometheus-rhel8@sha256:33abe74b18c6bea46a196143ad0b3d3885b010e3cb764b9ebcc95ee24ee61963_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/prometheus-rhel8@sha256:6226c81f65bbd972517be75a5e58b12f0279d76913f937a29613d71db8f0a0f4_amd64 as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:6226c81f65bbd972517be75a5e58b12f0279d76913f937a29613d71db8f0a0f4_amd64" }, "product_reference": "openshift-service-mesh/prometheus-rhel8@sha256:6226c81f65bbd972517be75a5e58b12f0279d76913f937a29613d71db8f0a0f4_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/prometheus-rhel8@sha256:ffd9f7dd13481cb6f9d67d83e845bae408e112d98be15fc8553a729ee48a3dfd_s390x as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:ffd9f7dd13481cb6f9d67d83e845bae408e112d98be15fc8553a729ee48a3dfd_s390x" }, "product_reference": "openshift-service-mesh/prometheus-rhel8@sha256:ffd9f7dd13481cb6f9d67d83e845bae408e112d98be15fc8553a729ee48a3dfd_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:0bd7384d18ac426b3cfc1916c86a58c492e43a82c5ae7469f5508a74b7ee0b92_amd64 as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:0bd7384d18ac426b3cfc1916c86a58c492e43a82c5ae7469f5508a74b7ee0b92_amd64" }, "product_reference": "openshift-service-mesh/proxyv2-rhel8@sha256:0bd7384d18ac426b3cfc1916c86a58c492e43a82c5ae7469f5508a74b7ee0b92_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:300d87447c106d9762bfb3ef41adc0d419514b79eb8ee67014e9e894f2177b9a_ppc64le as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:300d87447c106d9762bfb3ef41adc0d419514b79eb8ee67014e9e894f2177b9a_ppc64le" }, "product_reference": "openshift-service-mesh/proxyv2-rhel8@sha256:300d87447c106d9762bfb3ef41adc0d419514b79eb8ee67014e9e894f2177b9a_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:8a015e6ebe3b2cf86da429f154787ae9d92d1ef567b33ab47c6f33cb0633c4c4_s390x as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:8a015e6ebe3b2cf86da429f154787ae9d92d1ef567b33ab47c6f33cb0633c4c4_s390x" }, "product_reference": "openshift-service-mesh/proxyv2-rhel8@sha256:8a015e6ebe3b2cf86da429f154787ae9d92d1ef567b33ab47c6f33cb0633c4c4_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:2e71b4d7783b783c2c0a292d78dff3048ecbd4c74c93a2f66c519b021a4c0b68_amd64 as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:2e71b4d7783b783c2c0a292d78dff3048ecbd4c74c93a2f66c519b021a4c0b68_amd64" }, "product_reference": "openshift-service-mesh/ratelimit-rhel8@sha256:2e71b4d7783b783c2c0a292d78dff3048ecbd4c74c93a2f66c519b021a4c0b68_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:894c1fb3feaa27fb86ed80f648f09d6fe2ee4495977be0c776fead5b2bdee621_ppc64le as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:894c1fb3feaa27fb86ed80f648f09d6fe2ee4495977be0c776fead5b2bdee621_ppc64le" }, "product_reference": "openshift-service-mesh/ratelimit-rhel8@sha256:894c1fb3feaa27fb86ed80f648f09d6fe2ee4495977be0c776fead5b2bdee621_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:f47ff32671d8eadeedc569040b19ad04fb5e65c94523cff4625154d46839c156_s390x as a component of RHOSSM 2.3 for RHEL 8", "product_id": "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:f47ff32671d8eadeedc569040b19ad04fb5e65c94523cff4625154d46839c156_s390x" }, "product_reference": "openshift-service-mesh/ratelimit-rhel8@sha256:f47ff32671d8eadeedc569040b19ad04fb5e65c94523cff4625154d46839c156_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Philippe Antoine" ], "organization": "Catena Cyber" } ], "cve": "CVE-2022-41723", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:14bfa79954caee54a6d23683da3614cc251b1ec4e08303e3ec4217ee322c043f_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:1abfbe1c3898a4085fae3c76a8a6831342b74680edc711c0688d48ab86ffa5a9_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:cd047c9fcde218dd4bc7a673f7e027039e43ef67d8277517905afd25513cd51a_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:411d0566a7c16469ded33d4f8b3b893d7f0ecc1363b033f711eaddacecca33d8_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:8c14b7863467e814c833fa278d6b0be058b706b6ddd2b8bf84d6054cd354dc7a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:afbd6f41156f3f0143b2a65972b15400d0cced3b8e19af16558b85b4c452f328_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:408c3da264aa721610fc9672946dbb22ce494847cec8d31b4100cf86c5b55a64_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:68362d4be19bbae7d5d31ebb1328f4910957ea8b85120ee3e43c66c053a80810_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:a061c7046ac2b62c60e953d21e35781ac26423edc079060f98d0589b47ca681d_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:a9b60e12998dbe1efa9e475f9cca96ee58436407ddc5888d83c3206d031b3c47_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fcab427703c41e5e821825e839099856aa7c4c001007d8d12e0ac8692e5644da_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fd90eda22dfaa7630540794a9ba30a38e81fc78269157ca92e002e8d384f8482_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:33abe74b18c6bea46a196143ad0b3d3885b010e3cb764b9ebcc95ee24ee61963_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:6226c81f65bbd972517be75a5e58b12f0279d76913f937a29613d71db8f0a0f4_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:ffd9f7dd13481cb6f9d67d83e845bae408e112d98be15fc8553a729ee48a3dfd_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:0bd7384d18ac426b3cfc1916c86a58c492e43a82c5ae7469f5508a74b7ee0b92_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:300d87447c106d9762bfb3ef41adc0d419514b79eb8ee67014e9e894f2177b9a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:8a015e6ebe3b2cf86da429f154787ae9d92d1ef567b33ab47c6f33cb0633c4c4_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:2e71b4d7783b783c2c0a292d78dff3048ecbd4c74c93a2f66c519b021a4c0b68_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:894c1fb3feaa27fb86ed80f648f09d6fe2ee4495977be0c776fead5b2bdee621_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:f47ff32671d8eadeedc569040b19ad04fb5e65c94523cff4625154d46839c156_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178358" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding", "title": "Vulnerability summary" }, { "category": "other", "text": "Within OpenShift Container Platform, the maximum impact of this vulnerability is a denial of service against an individual container so the impact could not cascade across the entire infrastructure, this vulnerability is rated Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d_s390x" ], "known_not_affected": [ "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:14bfa79954caee54a6d23683da3614cc251b1ec4e08303e3ec4217ee322c043f_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:1abfbe1c3898a4085fae3c76a8a6831342b74680edc711c0688d48ab86ffa5a9_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:cd047c9fcde218dd4bc7a673f7e027039e43ef67d8277517905afd25513cd51a_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:411d0566a7c16469ded33d4f8b3b893d7f0ecc1363b033f711eaddacecca33d8_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:8c14b7863467e814c833fa278d6b0be058b706b6ddd2b8bf84d6054cd354dc7a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:afbd6f41156f3f0143b2a65972b15400d0cced3b8e19af16558b85b4c452f328_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:408c3da264aa721610fc9672946dbb22ce494847cec8d31b4100cf86c5b55a64_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:68362d4be19bbae7d5d31ebb1328f4910957ea8b85120ee3e43c66c053a80810_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:a061c7046ac2b62c60e953d21e35781ac26423edc079060f98d0589b47ca681d_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:a9b60e12998dbe1efa9e475f9cca96ee58436407ddc5888d83c3206d031b3c47_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fcab427703c41e5e821825e839099856aa7c4c001007d8d12e0ac8692e5644da_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fd90eda22dfaa7630540794a9ba30a38e81fc78269157ca92e002e8d384f8482_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:33abe74b18c6bea46a196143ad0b3d3885b010e3cb764b9ebcc95ee24ee61963_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:6226c81f65bbd972517be75a5e58b12f0279d76913f937a29613d71db8f0a0f4_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:ffd9f7dd13481cb6f9d67d83e845bae408e112d98be15fc8553a729ee48a3dfd_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:0bd7384d18ac426b3cfc1916c86a58c492e43a82c5ae7469f5508a74b7ee0b92_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:300d87447c106d9762bfb3ef41adc0d419514b79eb8ee67014e9e894f2177b9a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:8a015e6ebe3b2cf86da429f154787ae9d92d1ef567b33ab47c6f33cb0633c4c4_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:2e71b4d7783b783c2c0a292d78dff3048ecbd4c74c93a2f66c519b021a4c0b68_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:894c1fb3feaa27fb86ed80f648f09d6fe2ee4495977be0c776fead5b2bdee621_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:f47ff32671d8eadeedc569040b19ad04fb5e65c94523cff4625154d46839c156_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41723" }, { "category": "external", "summary": "RHBZ#2178358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h", "url": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h" }, { "category": "external", "summary": "https://go.dev/cl/468135", "url": "https://go.dev/cl/468135" }, { "category": "external", "summary": "https://go.dev/cl/468295", "url": "https://go.dev/cl/468295" }, { "category": "external", "summary": "https://go.dev/issue/57855", "url": "https://go.dev/issue/57855" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1571", "url": "https://pkg.go.dev/vuln/GO-2023-1571" }, { "category": "external", "summary": "https://vuln.go.dev/ID/GO-2023-1571.json", "url": "https://vuln.go.dev/ID/GO-2023-1571.json" } ], "release_date": "2023-02-17T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-17T16:29:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4113" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding" }, { "acknowledgments": [ { "names": [ "David Benoit" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-3089", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "discovery_date": "2023-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2212085" } ], "notes": [ { "category": "description", "text": "A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.", "title": "Vulnerability description" }, { "category": "summary", "text": "openshift: OCP \u0026 FIPS mode", "title": "Vulnerability summary" }, { "category": "other", "text": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-001\n\nThe static scanning tool (to verify your system is once again compliant with FIPS) is available here https://github.com/openshift/check-payload", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:14bfa79954caee54a6d23683da3614cc251b1ec4e08303e3ec4217ee322c043f_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:1abfbe1c3898a4085fae3c76a8a6831342b74680edc711c0688d48ab86ffa5a9_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:cd047c9fcde218dd4bc7a673f7e027039e43ef67d8277517905afd25513cd51a_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:411d0566a7c16469ded33d4f8b3b893d7f0ecc1363b033f711eaddacecca33d8_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:8c14b7863467e814c833fa278d6b0be058b706b6ddd2b8bf84d6054cd354dc7a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:afbd6f41156f3f0143b2a65972b15400d0cced3b8e19af16558b85b4c452f328_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:408c3da264aa721610fc9672946dbb22ce494847cec8d31b4100cf86c5b55a64_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:68362d4be19bbae7d5d31ebb1328f4910957ea8b85120ee3e43c66c053a80810_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:a061c7046ac2b62c60e953d21e35781ac26423edc079060f98d0589b47ca681d_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:a9b60e12998dbe1efa9e475f9cca96ee58436407ddc5888d83c3206d031b3c47_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fcab427703c41e5e821825e839099856aa7c4c001007d8d12e0ac8692e5644da_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fd90eda22dfaa7630540794a9ba30a38e81fc78269157ca92e002e8d384f8482_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:33abe74b18c6bea46a196143ad0b3d3885b010e3cb764b9ebcc95ee24ee61963_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:6226c81f65bbd972517be75a5e58b12f0279d76913f937a29613d71db8f0a0f4_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:ffd9f7dd13481cb6f9d67d83e845bae408e112d98be15fc8553a729ee48a3dfd_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:0bd7384d18ac426b3cfc1916c86a58c492e43a82c5ae7469f5508a74b7ee0b92_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:300d87447c106d9762bfb3ef41adc0d419514b79eb8ee67014e9e894f2177b9a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:8a015e6ebe3b2cf86da429f154787ae9d92d1ef567b33ab47c6f33cb0633c4c4_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:2e71b4d7783b783c2c0a292d78dff3048ecbd4c74c93a2f66c519b021a4c0b68_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:894c1fb3feaa27fb86ed80f648f09d6fe2ee4495977be0c776fead5b2bdee621_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:f47ff32671d8eadeedc569040b19ad04fb5e65c94523cff4625154d46839c156_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-3089" }, { "category": "external", "summary": "RHBZ#2212085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212085" }, { "category": "external", "summary": "RHSB-2023-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3089", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3089" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3089", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3089" } ], "release_date": "2023-07-05T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-17T16:29:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:14bfa79954caee54a6d23683da3614cc251b1ec4e08303e3ec4217ee322c043f_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:1abfbe1c3898a4085fae3c76a8a6831342b74680edc711c0688d48ab86ffa5a9_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:cd047c9fcde218dd4bc7a673f7e027039e43ef67d8277517905afd25513cd51a_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:411d0566a7c16469ded33d4f8b3b893d7f0ecc1363b033f711eaddacecca33d8_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:8c14b7863467e814c833fa278d6b0be058b706b6ddd2b8bf84d6054cd354dc7a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:afbd6f41156f3f0143b2a65972b15400d0cced3b8e19af16558b85b4c452f328_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:408c3da264aa721610fc9672946dbb22ce494847cec8d31b4100cf86c5b55a64_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:68362d4be19bbae7d5d31ebb1328f4910957ea8b85120ee3e43c66c053a80810_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:a061c7046ac2b62c60e953d21e35781ac26423edc079060f98d0589b47ca681d_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:a9b60e12998dbe1efa9e475f9cca96ee58436407ddc5888d83c3206d031b3c47_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fcab427703c41e5e821825e839099856aa7c4c001007d8d12e0ac8692e5644da_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fd90eda22dfaa7630540794a9ba30a38e81fc78269157ca92e002e8d384f8482_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:33abe74b18c6bea46a196143ad0b3d3885b010e3cb764b9ebcc95ee24ee61963_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:6226c81f65bbd972517be75a5e58b12f0279d76913f937a29613d71db8f0a0f4_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:ffd9f7dd13481cb6f9d67d83e845bae408e112d98be15fc8553a729ee48a3dfd_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:0bd7384d18ac426b3cfc1916c86a58c492e43a82c5ae7469f5508a74b7ee0b92_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:300d87447c106d9762bfb3ef41adc0d419514b79eb8ee67014e9e894f2177b9a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:8a015e6ebe3b2cf86da429f154787ae9d92d1ef567b33ab47c6f33cb0633c4c4_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:2e71b4d7783b783c2c0a292d78dff3048ecbd4c74c93a2f66c519b021a4c0b68_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:894c1fb3feaa27fb86ed80f648f09d6fe2ee4495977be0c776fead5b2bdee621_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:f47ff32671d8eadeedc569040b19ad04fb5e65c94523cff4625154d46839c156_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4113" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected packages as soon as possible.", "product_ids": [ "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:14bfa79954caee54a6d23683da3614cc251b1ec4e08303e3ec4217ee322c043f_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:1abfbe1c3898a4085fae3c76a8a6831342b74680edc711c0688d48ab86ffa5a9_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:cd047c9fcde218dd4bc7a673f7e027039e43ef67d8277517905afd25513cd51a_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:411d0566a7c16469ded33d4f8b3b893d7f0ecc1363b033f711eaddacecca33d8_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:8c14b7863467e814c833fa278d6b0be058b706b6ddd2b8bf84d6054cd354dc7a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:afbd6f41156f3f0143b2a65972b15400d0cced3b8e19af16558b85b4c452f328_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:408c3da264aa721610fc9672946dbb22ce494847cec8d31b4100cf86c5b55a64_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:68362d4be19bbae7d5d31ebb1328f4910957ea8b85120ee3e43c66c053a80810_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:a061c7046ac2b62c60e953d21e35781ac26423edc079060f98d0589b47ca681d_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:a9b60e12998dbe1efa9e475f9cca96ee58436407ddc5888d83c3206d031b3c47_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fcab427703c41e5e821825e839099856aa7c4c001007d8d12e0ac8692e5644da_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fd90eda22dfaa7630540794a9ba30a38e81fc78269157ca92e002e8d384f8482_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:33abe74b18c6bea46a196143ad0b3d3885b010e3cb764b9ebcc95ee24ee61963_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:6226c81f65bbd972517be75a5e58b12f0279d76913f937a29613d71db8f0a0f4_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:ffd9f7dd13481cb6f9d67d83e845bae408e112d98be15fc8553a729ee48a3dfd_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:0bd7384d18ac426b3cfc1916c86a58c492e43a82c5ae7469f5508a74b7ee0b92_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:300d87447c106d9762bfb3ef41adc0d419514b79eb8ee67014e9e894f2177b9a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:8a015e6ebe3b2cf86da429f154787ae9d92d1ef567b33ab47c6f33cb0633c4c4_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:2e71b4d7783b783c2c0a292d78dff3048ecbd4c74c93a2f66c519b021a4c0b68_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:894c1fb3feaa27fb86ed80f648f09d6fe2ee4495977be0c776fead5b2bdee621_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:f47ff32671d8eadeedc569040b19ad04fb5e65c94523cff4625154d46839c156_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:14bfa79954caee54a6d23683da3614cc251b1ec4e08303e3ec4217ee322c043f_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:1abfbe1c3898a4085fae3c76a8a6831342b74680edc711c0688d48ab86ffa5a9_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/grafana-rhel8@sha256:cd047c9fcde218dd4bc7a673f7e027039e43ef67d8277517905afd25513cd51a_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:411d0566a7c16469ded33d4f8b3b893d7f0ecc1363b033f711eaddacecca33d8_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:8c14b7863467e814c833fa278d6b0be058b706b6ddd2b8bf84d6054cd354dc7a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-cni-rhel8@sha256:afbd6f41156f3f0143b2a65972b15400d0cced3b8e19af16558b85b4c452f328_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:408c3da264aa721610fc9672946dbb22ce494847cec8d31b4100cf86c5b55a64_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:68362d4be19bbae7d5d31ebb1328f4910957ea8b85120ee3e43c66c053a80810_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/istio-must-gather-rhel8@sha256:a061c7046ac2b62c60e953d21e35781ac26423edc079060f98d0589b47ca681d_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:424009a29b4ea3c09572d1cd89ea1a72f168db6619165f20df15702b673f0a5a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:7333a3c2814ce860254f19a79d0ddea884703d4152ec6bc75a2637d11ab9c8f2_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/kiali-rhel8@sha256:8ef04bcf54f84e349c6f0395301d031d7c8f8a5f058103043db813ab9a06f96d_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:a9b60e12998dbe1efa9e475f9cca96ee58436407ddc5888d83c3206d031b3c47_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fcab427703c41e5e821825e839099856aa7c4c001007d8d12e0ac8692e5644da_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/pilot-rhel8@sha256:fd90eda22dfaa7630540794a9ba30a38e81fc78269157ca92e002e8d384f8482_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:33abe74b18c6bea46a196143ad0b3d3885b010e3cb764b9ebcc95ee24ee61963_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:6226c81f65bbd972517be75a5e58b12f0279d76913f937a29613d71db8f0a0f4_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/prometheus-rhel8@sha256:ffd9f7dd13481cb6f9d67d83e845bae408e112d98be15fc8553a729ee48a3dfd_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:0bd7384d18ac426b3cfc1916c86a58c492e43a82c5ae7469f5508a74b7ee0b92_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:300d87447c106d9762bfb3ef41adc0d419514b79eb8ee67014e9e894f2177b9a_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/proxyv2-rhel8@sha256:8a015e6ebe3b2cf86da429f154787ae9d92d1ef567b33ab47c6f33cb0633c4c4_s390x", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:2e71b4d7783b783c2c0a292d78dff3048ecbd4c74c93a2f66c519b021a4c0b68_amd64", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:894c1fb3feaa27fb86ed80f648f09d6fe2ee4495977be0c776fead5b2bdee621_ppc64le", "8Base-RHOSSM-2.3:openshift-service-mesh/ratelimit-rhel8@sha256:f47ff32671d8eadeedc569040b19ad04fb5e65c94523cff4625154d46839c156_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openshift: OCP \u0026 FIPS mode" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.