Описание
ELSA-2021-9398: olcne security update (IMPORTANT)
olcne [1.3.1-5]
- Updated registry-image-helper.sh to work with olcne-utils
[1.3.1-4]
- Fix istio template for 1.9.6 and 1.10.2 for k8s update failure
[1.3.1-3]
- Added END_VERSION_BLOCK for OLM image
[1.3.1-2]
- Fix iptables issue when running on OL7 host using OL8 image for 1.19.8
- Fix iptables issue when running on OL7 host using OL8 image
- Address Istio CVE's CVE-2021-28683, CVE-2021-28682, CVE-2021-29258, CVE-2021-31920, CVE-2021-31921, CVE-2021-34824
- Fixed yaml file to stop olcne-nginx and keepalived services at uninstall [Orabug: 32296282]
- Fixed missing double semicolon in registry image helper
kubernetes [1.20.6-2]
- Fix iptables OL7 host kernel issue when running with OL8 image
[1.20.6-1]
- Added Oracle specific build files for Kubernetes
kubernetes [1.19.8-3]
- Fix iptables issue when running on OL7 host with OL8 image
istio [1.9.6-2]
- Fix iptables issue when running on OL7 host using OL8 image
- Added istio-mixs and istio-mixc to Obsoletes list
[1.9.6-1]
- Address CVE-2021-28683, CVE-2021-28682, CVE-2021-29258, CVE-2021-31920, CVE-2021-31921, CVE-2021-34824
istio [1.10.2-2]
- Fix iptables problem when running on OL7 host using OL8 image
[1.10.2-1]
- Address CVE-2021-28683, CVE-2021-28682, CVE-2021-29258, CVE-2021-31920, CVE-2021-31921, CVE-2021-34824
Обновленные пакеты
Oracle Linux 8
Oracle Linux x86_64
istio
1.10.2-2.el8
istio
1.9.6-2.el8
istio-istioctl
1.10.2-2.el8
istio-istioctl
1.9.6-2.el8
kubeadm
1.19.8-3.el8
kubeadm
1.20.6-2.el8
kubectl
1.19.8-3.el8
kubectl
1.20.6-2.el8
kubelet
1.19.8-3.el8
kubelet
1.20.6-2.el8
olcne-agent
1.3.1-5.el8
olcne-api-server
1.3.1-5.el8
olcne-grafana-chart
1.3.1-5.el8
olcne-istio-chart
1.3.1-5.el8
olcne-nginx
1.3.1-5.el8
olcne-olm-chart
1.3.1-5.el8
olcne-prometheus-chart
1.3.1-5.el8
olcne-utils
1.3.1-5.el8
olcnectl
1.3.1-5.el8
Ссылки на источники
Связанные уязвимости
An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable NULL pointer dereference and crash in TLS when an unknown TLS alert code is received.
An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable NULL pointer dereference and crash in TLS when an unknown TLS alert code is received.