mirror of https://github.com/istio/istio.io.git
Cherry pick feb 22 CVE announcement (#10958)
* Feb 2022 CVE (#10955) * [release-1.13] CVE Feb 22, 2022 announcement (#32) * Latest release notes for 1.11, 1.12 and 1.13 * Write up documentation for istio cve * Update content/en/news/security/istio-security-2022-003/index.md Co-authored-by: craigbox <craigbox@google.com> * bring language from GHSA to docs (#10957) * Update index.md * Update content/en/news/security/istio-security-2022-003/index.md Co-authored-by: Frank Budinsky <frankb@ca.ibm.com> Co-authored-by: Frank Budinsky <frankb@ca.ibm.com> Co-authored-by: craigbox <craigbox@google.com> Co-authored-by: Frank Budinsky <frankb@ca.ibm.com>
This commit is contained in:
parent
6706c49177
commit
66b10ba7f7
|
@ -273,6 +273,13 @@ CVE-2021-39155
|
|||
CVE-2021-39156
|
||||
CVE-2022-21679
|
||||
CVE-2022-21701
|
||||
CVE-2021-43824
|
||||
CVE-2021-43825
|
||||
CVE-2021-43826
|
||||
CVE-2022-21654
|
||||
CVE-2022-21655
|
||||
CVE-2022-23606
|
||||
CVE-2022-23635
|
||||
CVEs
|
||||
cves
|
||||
cvss
|
||||
|
@ -469,6 +476,7 @@ ISTIO-SECURITY-2021-007
|
|||
ISTIO-SECURITY-2021-008
|
||||
ISTIO-SECURITY-2022-001
|
||||
ISTIO-SECURITY-2022-002
|
||||
ISTIO-SECURITY-2022-003
|
||||
istio-system
|
||||
istio.io
|
||||
istio.io.
|
||||
|
|
|
@ -76,9 +76,9 @@ Please keep up-to-date and use a supported version.
|
|||
|
||||
| Minor Releases | Patched versions with no known CVEs |
|
||||
|----------------------------|--------------------------------------|
|
||||
| 1.13.x | 1.13.0+ |
|
||||
| 1.12.x | 1.12.2+ |
|
||||
| 1.11.x | 1.11.1+ |
|
||||
| 1.13.x | 1.13.1+ |
|
||||
| 1.12.x | 1.12.4+ |
|
||||
| 1.11.x | 1.11.7+ |
|
||||
| 1.10.x | 1.10.4+ |
|
||||
| 1.9.x | 1.9.9 |
|
||||
| 1.8 and earlier | None |
|
||||
|
|
|
@ -0,0 +1,19 @@
|
|||
---
|
||||
title: Announcing Istio 1.11.7
|
||||
linktitle: 1.11.7
|
||||
subtitle: Patch Release
|
||||
description: Istio 1.11.7 patch release.
|
||||
publishdate: 2022-02-22
|
||||
release: 1.11.7
|
||||
aliases:
|
||||
- /news/announcing-1.11.7
|
||||
---
|
||||
|
||||
This release fixes the security vulnerabilities described in our February 22nd post, [ISTIO-SECURITY-2022-003](/news/security/istio-security-2022-003). This release note describes what’s different between Istio 1.11.6 and 1.11.7.
|
||||
|
||||
{{< relnote >}}
|
||||
|
||||
## Security update
|
||||
|
||||
- __[CVE-2022-23635](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2022-23635])__:
|
||||
CVE-2022-23635 (CVSS Score 7.5, High): Unauthenticated control plane denial of service attack.
|
|
@ -0,0 +1,24 @@
|
|||
---
|
||||
title: Announcing Istio 1.12.4
|
||||
linktitle: 1.12.4
|
||||
subtitle: Patch Release
|
||||
description: Istio 1.12.4 patch release.
|
||||
publishdate: 2022-02-22
|
||||
release: 1.12.4
|
||||
aliases:
|
||||
- /news/announcing-1.12.4
|
||||
---
|
||||
|
||||
This release fixes the security vulnerabilities described in our February 22nd post, [ISTIO-SECURITY-2022-003](/news/security/istio-security-2022-003). This release note describes what’s different between Istio 1.12.3 and 1.12.4.
|
||||
|
||||
{{< relnote >}}
|
||||
|
||||
## Security update
|
||||
|
||||
- __[CVE-2022-23635](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2022-23635])__:
|
||||
CVE-2022-23635 (CVSS Score 7.5, High): Unauthenticated control plane denial of service attack.
|
||||
|
||||
# Changes
|
||||
|
||||
- **Fixed** an issue where service update does not trigger route update.
|
||||
([Issue #37356](https://github.com/istio/istio/pull/37356))
|
|
@ -0,0 +1,27 @@
|
|||
---
|
||||
title: Announcing Istio 1.13.1
|
||||
linktitle: 1.13.1
|
||||
subtitle: Patch Release
|
||||
description: Istio 1.13.1 patch release.
|
||||
publishdate: 2022-02-22
|
||||
release: 1.13.1
|
||||
aliases:
|
||||
- /news/announcing-1.13.1
|
||||
---
|
||||
|
||||
This release fixes the security vulnerabilities described in our February 22nd post, [ISTIO-SECURITY-2022-003](/news/security/istio-security-2022-003). This release note describes what’s different between Istio 1.13.0 and 1.13.1.
|
||||
|
||||
{{< relnote >}}
|
||||
|
||||
## Security update
|
||||
|
||||
- __[CVE-2022-23635](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2022-23635])__:
|
||||
CVE-2022-23635 (CVSS Score 7.5, High): Unauthenticated control plane denial of service attack.
|
||||
|
||||
# Changes
|
||||
|
||||
- **Fixed** `istioctl x describe svc` not evaluating port `appProtocol` properly.
|
||||
([Issue #37159](https://github.com/istio/istio/issues/37159))
|
||||
|
||||
- **Fixed** an issue where service update does not trigger route update.
|
||||
([Issue #37356](https://github.com/istio/istio/pull/37356))
|
|
@ -0,0 +1,60 @@
|
|||
---
|
||||
title: ISTIO-SECURITY-2022-003
|
||||
subtitle: Security Bulletin
|
||||
description: Multiple CVEs related to istiod Denial of Service and Envoy.
|
||||
cves: [CVE-2022-21701, CVE-2021-43824, CVE-2021-43825, CVE-2021-43826, CVE-2022-21654, CVE-2022-21655, CVE-2022-23606]
|
||||
cvss: "7.5"
|
||||
vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
|
||||
releases: ["All releases prior to 1.11.0", "1.11.0 to 1.11.6", "1.12.0 to 1.12.3", "1.13.0"]
|
||||
publishdate: 2022-02-22
|
||||
keywords: [CVE]
|
||||
skip_seealso: true
|
||||
---
|
||||
|
||||
{{< security_bulletin >}}
|
||||
|
||||
## CVE
|
||||
|
||||
### CVE-2022-23635
|
||||
|
||||
- __[CVE-2022-23635](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2022-23635])__:
|
||||
CVE-2022-23635 (CVSS Score 7.5, High): Unauthenticated control plane denial of service attack.
|
||||
|
||||
The Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that
|
||||
sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012,
|
||||
but does not require any authentication from the attacker.
|
||||
|
||||
For simple installations, istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially [multicluster topologies](/docs/setup/install/multicluster/primary-remote/), this port is exposed over the public internet.
|
||||
|
||||
### Envoy CVEs
|
||||
|
||||
At this time it is not believed that Istio is vulnerable to these CVEs in Envoy. They are listed, however,
|
||||
to be transparent.
|
||||
|
||||
- __[CVE-2021-43824](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2021-43824])__:
|
||||
CVE-2021-43824 (CVSS Score 6.5, Medium): Envoy 1.21.0 and earlier - Potential null pointer dereference when using JWT filter `safe_regex` match.
|
||||
|
||||
- __[CVE-2021-43825](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2021-43825])__:
|
||||
CVE-2021-43825 (CVSS Score 6.1, Medium): Envoy 1.21.0 and earlier - Use-after-free when response filters increase response data, and increased data exceeds downstream buffer limits.
|
||||
|
||||
- __[CVE-2021-43826](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2021-43826])__:
|
||||
CVE-2021-43826 (CVSS Score 6.1, Medium): Envoy 1.21.0 and earlier - Use-after-free when tunneling TCP over HTTP, if downstream disconnects during upstream connection establishment.
|
||||
|
||||
- __[CVE-2022-21654](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2022-21654])__:
|
||||
CVE-2022-21654 (CVSS Score 7.3, High): Envoy 1.7.0 and later - Incorrect configuration handling allows mTLS session re-use without re-validation after validation settings have changed.
|
||||
|
||||
- __[CVE-2022-21655](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2022-21655])__:
|
||||
CVE-2022-21655 (CVSS Score 7.5, High): Envoy 1.21 and earlier - Incorrect handling of internal redirects to routes with a direct response entry.
|
||||
|
||||
The following CVE did not apply to Istio 1.11.6.
|
||||
|
||||
- __[CVE-2022-23606](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2022-23606])__:
|
||||
CVE-2022-23606 (CVSS Score 4.4, Moderate): Envoy 1.20 and later - Stack exhaustion when a cluster is deleted via Cluster Discovery Service.
|
||||
|
||||
## Am I Impacted?
|
||||
|
||||
You are at most risk if you are running Istio in a multi-cluster environment, or if you have exposed your istiod externally.
|
||||
|
||||
## Credit
|
||||
|
||||
We would like to thank John Howard (Google) for the report and the fix.
|
Loading…
Reference in New Issue