Always-Incorrect Control Flow Implementation Affecting servicemesh-galley package, versions *


Severity

Recommended
medium

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.24% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-SERVICEMESHGALLEY-4399163
  • published26 Mar 2023
  • disclosed18 Jan 2022

Introduced: 18 Jan 2022

CVE-2022-21679  (opens in a new tab)
CWE-670  (opens in a new tab)
CWE-1220  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:8 servicemesh-galley.

NVD Description

Note: Versions mentioned in the description apply only to the upstream servicemesh-galley package and not the servicemesh-galley package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

Istio is an open platform to connect, manage, and secure microservices. In Istio 1.12.0 and 1.12.1 The authorization policy with hosts and notHosts might be accidentally bypassed for ALLOW action or rejected unexpectedly for DENY action during the upgrade from 1.11 to 1.12.0/1.12.1. Istio 1.12 supports the hosts and notHosts fields in authorization policy with a new Envoy API shipped with the 1.12 data plane. A bug in the 1.12.0 and 1.12.1 incorrectly uses the new Envoy API with the 1.11 data plane. This will cause the hosts and notHosts fields to be always matched regardless of the actual value of the host header when mixing 1.12.0/1.12.1 control plane and 1.11 data plane. Users are advised to upgrade or to not mix the 1.12.0/1.12.1 control plane with 1.11 data plane if using hosts or notHosts field in authorization policy.

CVSS Scores

version 3.1