Описание
ELSA-2024-12348: cri-o security update (IMPORTANT)
cri-o [1.26.4-2]
- Address CVE-2024-24786
cri-tools [1.26.1-5]
- Address CVE-2024-24786
etcd [3.5.10-3]
- Address protobuf [CVE-2024-24786]
[3.5.10-1]
- Added Oracle specific build files
istio [1.17.8-3]
- Address protobuf [CVE-2024-24786]
- Backport from 1.19.7 to address CVE-2024-23322, CVE-2024-23323, CVE-2024-23324, CVE-2024-23325, CVE-2024-23327
kubernetes [1.26.15-1]
- Added Oracle specific build files for Kubernetes
olcne [1.7.7-2]
- Fixed unable to deploy new module(s) using config file containing already existing modules
- Update Istio-1.17.8 to address CVE-2024-24786, CVE-2024-23322, CVE-2024-23323, CVE-2024-23324, CVE-2024-23325, CVE-2024-23327
- Update Kubernetes-1.26.15 and components to address CVE-2024-24786
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
etcd
3.5.10-3.el8
Oracle Linux x86_64
cri-o
1.26.4-2.el8
cri-tools
1.26.1-5.el8
etcd
3.5.10-3.el8
istio
1.17.8-3.el8
istio-istioctl
1.17.8-3.el8
kubeadm
1.26.15-1.el8
kubectl
1.26.15-1.el8
kubelet
1.26.15-1.el8
olcne-agent
1.7.7-2.el8
olcne-api-server
1.7.7-2.el8
olcne-calico-chart
1.7.7-2.el8
olcne-gluster-chart
1.7.7-2.el8
olcne-grafana-chart
1.7.7-2.el8
olcne-istio-chart
1.7.7-2.el8
olcne-kubevirt-chart
1.7.7-2.el8
olcne-metallb-chart
1.7.7-2.el8
olcne-multus-chart
1.7.7-2.el8
olcne-nginx
1.7.7-2.el8
olcne-oci-ccm-chart
1.7.7-2.el8
olcne-olm-chart
1.7.7-2.el8
olcne-prometheus-chart
1.7.7-2.el8
olcne-rook-chart
1.7.7-2.el8
olcne-utils
1.7.7-2.el8
olcnectl
1.7.7-2.el8
Связанные CVE
Связанные уязвимости
Envoy is a high-performance edge/middle/service proxy. When PPv2 is enabled both on a listener and subsequent cluster, the Envoy instance will segfault when attempting to craft the upstream PPv2 header. This occurs when the downstream request has a command type of LOCAL and does not have the protocol block. This issue has been addressed in releases 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Envoy is a high-performance edge/middle/service proxy. When PPv2 is enabled both on a listener and subsequent cluster, the Envoy instance will segfault when attempting to craft the upstream PPv2 header. This occurs when the downstream request has a command type of LOCAL and does not have the protocol block. This issue has been addressed in releases 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.