Add release notes for Istio 1.2.3 (#4755)

* Add release notes for Istio 1.2.3

- Also introduce a cosmetic style fix on cve-2019-12995 that was missing
  proper new line before 2 lists.

* Fix linting

* Correct fix

* Update content/boilerplates/notes/1.2.3.md

Co-Authored-By: Joshua Blatt <jblatt@google.com>

* Update content/boilerplates/notes/1.2.3.md

Co-Authored-By: Joshua Blatt <jblatt@google.com>

* Update content/boilerplates/notes/1.2.3.md

Co-Authored-By: Joshua Blatt <jblatt@google.com>

* Update content/boilerplates/notes/1.2.3.md
This commit is contained in:
Francois Pesce 2019-08-02 15:37:43 -07:00 committed by Istio Automation
parent 9fb2042c34
commit 56bccf2ff8
4 changed files with 37 additions and 0 deletions

View File

@ -0,0 +1,10 @@
---
title: Istio 1.2.3
publishdate: 2019-08-02
icon: notes
release: 1.2.3
---
This release includes bug fixes. This release note describes what's different between Istio 1.2.2 and Istio 1.2.3.
{{< relnote >}}

View File

@ -0,0 +1,11 @@
---
title: Announcing Istio 1.2.3
description: Istio 1.2.3 patch release.
publishdate: 2019-08-02
attribution: The Istio Team
release: 1.2.3
---
We're pleased to announce the availability of Istio 1.2.3. Please see below for what's changed.
{{< relnote >}}

View File

@ -37,6 +37,7 @@ Overall CVSS score: 7.5 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C](http
## Vulnerability impact and Detection
Envoy is vulnerable if the following two conditions are satisfied:
* A JWT authentication policy is applied to it.
* The JWT issuer (specified by `jwksUri`) uses the RSA algorithm for signature verification
@ -51,6 +52,7 @@ If JWT policy is applied to the sidecar only, please keep in mind it might still
A vulnerable Envoy will crash on an HTTP request with a malformed JWT token. When Envoy crashes, all existing connections will be disconnected immediately. The `pilot-agent` will restart the crashed Envoy automatically and it may take a few seconds to a few minutes for the restart. pilot-agent will stop restarting Envoy after it crashed more than ten times. In this case, Kubernetes will redeploy the pod, including the workload behind Envoy.
To detect if there is any JWT authentication policy applied in your cluster, run the following command which print either of the following output:
* Found JWT in authentication policy, **YOU ARE AFFECTED**
* Did NOT find JWT in authentication policy, *YOU ARE NOT AFFECTED*

View File

@ -0,0 +1,14 @@
## Bug fixes
- Fix a bug where the sidecar could infinitely forward requests to itself when pod defines a port undefined for service ([Issue 14443](https://github.com/istio/istio/issues/14443)) and ([Issue 14242](https://github.com/istio/istio/issues/14242))
- Fix a bug where Stackdriver adapter shuts down after telemetry is started.
- Fix Redis connectivity issues.
- Fix case-sensitivity in regex-based HTTP URI matching for Virtual Service ([Issue 14983](https://github.com/istio/istio/issues/14983))
- Fix HPA and CPU settings for demo profile ([Issue 15338](https://github.com/istio/istio/issues/15338))
- Relax Keep-Alive enforcement policy to avoid dropping connections under load ([Issue 15088](https://github.com/istio/istio/issues/15088))
- When SDS is not used, skip Kubernetes JWT authentication to mitigate the risk of compromised (untrustworthy) JWTs being used.
## Tests upgrade
- Update base image version for Bookinfo reviews sample app ([Issue 15477](https://github.com/istio/istio/issues/15477))
- Bookinfo samples image qualification ([Issue 14237](https://github.com/istio/istio/issues/14237))