Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2022-9588

Опубликовано: 12 июл. 2022
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2022-9588: olcne security update (IMPORTANT)

olcne [1.5.4-3]

  • Fix bug in gen-certs-helper script to change permission of node.key to allow opc user to copy over

[1.5.4-2]

  • Istio CVE-2022-31045, CVE-2022-29225, CVE-2022-29224,CVE-2022-29226,CVE-2022-29228,CVE-2022-29227

[1.5.4-1]

  • Upgrade Kubernetes to 1.23.7

[1.5.3-1]

  • Address qemu CVE-2022-26353, CVE-2021-3748

[1.5.2-1]

  • Excluded unnecessary directories from k8s backup files

[1.5.1-1]

  • Fixed the bug in fetching node metadata for non-cloud nodes

[1.5.0-2]

  • Upgrade Helm to 3.7.1-2

[1.5.0-2]

  • fix null pointer exception in systemd service state validation

[1.5.0-1]

  • Introduce support for compact Kubernetes clusters
  • Introduce MetalLB
  • Introduce Oracle Cloud Infrastructure Cloud Controller Manager
  • Improved log messages in Platform API Server and Platform Agent
  • Upgrade Kubernetes to 1.22.8
  • Upgrade Istio to 1.13.2
  • Renamed the oci-csi module to oci-ccm

[1.5.0-20.alpha]

  • Update istio-1.13.2 grafana to 7.5.15

[1.5.0-14.alpha]

  • Metallb fix

[1.5.0-11.alpha]

  • Remove module directories when olcne rpm is uninstalled

[1.5.0-10.alpha]

  • OCI CCM 0.13.0

[1.5.0-9.alpha]

  • Reworked log messages

[1.5.0-8.alpha]

  • Update Istio to 1.13.2(prometheus-2.31.1, grafana-8.4.6)

[1.5.0-7.alpha]

  • Update Istio to 1.12.6(prometheus-2.30.1, grafana-7.5.15)

[1.5.0-6.alpha]

  • Update to k8s 1.22 with golang 1.17

[1.5.0-5.alpha]

  • Update internal docs for oci-ccm module

[1.5.0-4.alpha]

  • Extend oci-ccm module to support load balancer

[1.5.0-3.alpha]

  • Firewall pre-req

[1.5.0-2.alpha]

  • Ensure that config map settings needed by metallb is preserved during k8s upgrade

[1.5.0-1.alpha]

  • Metallb module

[1.4.1-14]

  • Added 1.4 extra images to registry-image-helper.sh script

[1.4.1-13]

  • Update sudoers file and changed its permissions to '0440'

[1.4.1-12]

  • Update olcne-kubernetes.md file for 'compact' flag

[1.4.1-11]

  • Ensure that the order of items in an upgraded config file is stable with respect to the original file

[1.4.1-10]

  • Ensure that old olcnectl config files are upgraded

[1.4.1-9]

  • Rename oci-csi module to oci-ccm and add support for oci-ccm loadbalancer creation

[1.4.1-8]

  • Make 'compact' flag updatable

[1.4.1-7]

  • Introduce 'compact' that enables control-plane nodes to run any workloads

[1.4.1-6]

  • Ability to label 1 or more kubernetes nodes

[1.4.1-5]

  • Fixed a bug where specifying a port in the container-registry argument to the Kubernetes module would result in pods not being able to start.

[1.4.1-4]

  • Update helm to 3.7.1

[1.4.1-3]

  • Update versions to Istio-1.12.2, prometheus-2.31.1 and grafana-7.5.11

[1.4.1-2]

  • Allow loadbalancer to be configured regardless of security list mode

[1.4.0-4]

  • Fix bug in initialising certs manager when environment name not mentioned

[1.4.0-3]

  • Fix bug in fetching report for multi-environment

[1.4.0-2]

  • Pause image is 3.4.1

[1.4.0-1]

  • CSI plugin
  • Reports feature
  • Kubernetes-1.20.6 to Kubernetes-1.21.6 upgrade
  • Istio-1.9.4 to Istio-1.11.4 upgrade
  • Component upgrades
  • Config file feature

[1.3.0-13]

  • Fix iptables issue when running on OL7 host using OL8 image

[1.3.0-12]

  • Address CVE's ISTIO-SECURITY-2021-003, ISTIO-SECURITY-2021-005, ISTIO-SECURITY-2021-006, ISTIO-SECURITY-2021-007

[1.3.0-11]

  • Fixed yaml file to stop olcne-nginx and keepalived services at uninstall [Orabug: 32296282]

[1.3.0-10]

  • Fixed missing double semicolon in registry image helper

[1.3.0-9] istio [1.13.5-1]

  • Added Oracle specific files for 1.13.5-1

kubernetes [1.23.7-1]

  • Added Oracle specific build files for Kubernetes

cri-tools [1.23.0-1]

  • Added Oracle Specific Build Files for cri-tools

cri-o [1.23.3-1]

  • Added Oracle Specifile Files for cri-o

kata [1.12.1-5]

  • updated cri-o and cri-tools versions to support kubernetes-1.23

[1.12.1-4]

  • update kata-image versions
  • update kernel-uek-container version to kernel-uek-container-5.4.17-2136.306.1.3

[1.21.1-3]

  • Support k8s 1.21.6
  • updated kernel-uek-container version
  • updated kata-image versions
  • added buildhost variable

[1.12.1-2]

  • Golang 1.15.9

[1.12.1-1]

  • Updated to kata 1.12.1
  • Updated guest kernel (kernel-uek-container) minimum version to UEK6U2 (5.4.17-2102.200.7)

etcd [3.5.1-2]

  • Updated THIRD_PARTY_LICENSES.txt file

[3.5.1-1]

  • Added Oracle specific build files

Обновленные пакеты

Oracle Linux 8

Oracle Linux x86_64

cri-o

1.23.3-1.el8

cri-tools

1.23.0-1.el8

etcd

3.5.1-2.el8

istio

1.13.5-1.el8

istio-istioctl

1.13.5-1.el8

kata

1.12.1-5.el8

kubeadm

1.23.7-1.el8

kubectl

1.23.7-1.el8

kubelet

1.23.7-1.el8

olcne-agent

1.5.4-3.el8

olcne-api-server

1.5.4-3.el8

olcne-gluster-chart

1.5.4-3.el8

olcne-grafana-chart

1.5.4-3.el8

olcne-istio-chart

1.5.4-3.el8

olcne-metallb-chart

1.5.4-3.el8

olcne-nginx

1.5.4-3.el8

olcne-oci-ccm-chart

1.5.4-3.el8

olcne-olm-chart

1.5.4-3.el8

olcne-prometheus-chart

1.5.4-3.el8

olcne-utils

1.5.4-3.el8

olcnectl

1.5.4-3.el8

Связанные уязвимости

oracle-oval
около 3 лет назад

ELSA-2022-9589: olcne security update (IMPORTANT)

oracle-oval
около 3 лет назад

ELSA-2022-9587: olcne security update (IMPORTANT)

oracle-oval
около 3 лет назад

ELSA-2022-9586: olcne security update (IMPORTANT)

CVSS3: 7.5
redhat
около 3 лет назад

Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn’t ever be called from filters after a local reply has been sent. Users are advised to upgrade. There are no known workarounds for this issue.

CVSS3: 7.5
nvd
около 3 лет назад

Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn’t ever be called from filters after a local reply has been sent. Users are advised to upgrade. There are no known workarounds for this issue.