mirror of https://github.com/istio/istio.io.git
Put links to github security advisories (#13012)
* Put links to github security advisories * Fix linting issues
This commit is contained in:
parent
486e84640c
commit
8ee897a91d
|
|
@ -14,23 +14,23 @@ This release note describes what’s different between Istio 1.15.6 and 1.15.7.
|
||||||
|
|
||||||
## Security update
|
## Security update
|
||||||
|
|
||||||
- __CVE-2023-27487__:
|
- __[CVE-2023-27487](https://github.com/envoyproxy/envoy/security/advisories/GHSA-5375-pq35-hf2g)__: (CVSS Score 8.2, High):
|
||||||
(CVSS Score 8.2, High): Client may fake the header `x-envoy-original-path`.
|
Client may fake the header `x-envoy-original-path`.
|
||||||
|
|
||||||
- __CVE-2023-27488__:
|
- __[CVE-2023-27488](https://github.com/envoyproxy/envoy/security/advisories/GHSA-9g5w-hqr3-w2ph)__: (CVSS Score 5.4, Moderate):
|
||||||
(CVSS Score 5.4, Moderate): gRPC client produces invalid protobuf when an HTTP header with non-UTF8 value is received.
|
gRPC client produces invalid protobuf when an HTTP header with non-UTF8 value is received.
|
||||||
|
|
||||||
- __CVE-2023-27491__:
|
- __[CVE-2023-27491](https://github.com/envoyproxy/envoy/security/advisories/GHSA-5jmv-cw9p-f9rp)__: (CVSS Score 5.4, Moderate):
|
||||||
(CVSS Score 5.4, Moderate): Envoy forwards invalid HTTP/2 and HTTP/3 downstream headers.
|
Envoy forwards invalid HTTP/2 and HTTP/3 downstream headers.
|
||||||
|
|
||||||
- __CVE-2023-27492__:
|
- __[CVE-2023-27492](https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2)__: (CVSS Score 4.8, Moderate):
|
||||||
(CVSS Score 4.8, Moderate): Crash when a large request body is processed in Lua filter.
|
Crash when a large request body is processed in Lua filter.
|
||||||
|
|
||||||
- __CVE-2023-27493__:
|
- __[CVE-2023-27493](https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q)__: (CVSS Score 8.1, High):
|
||||||
(CVSS Score 8.1, High): Envoy doesn't escape HTTP header values.
|
Envoy doesn't escape HTTP header values.
|
||||||
|
|
||||||
- __CVE-2023-27496__:
|
- __[CVE-2023-27496](https://github.com/envoyproxy/envoy/security/advisories/GHSA-j79q-2g66-2xv5)__: (CVSS Score 6.5, Moderate):
|
||||||
(CVSS Score 6.5, Moderate): Crash when a redirect url without a state parameter is received in the OAuth filter.
|
Crash when a redirect url without a state parameter is received in the OAuth filter.
|
||||||
|
|
||||||
## Changes
|
## Changes
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -14,23 +14,23 @@ This release note describes what’s different between Istio 1.16.3 and 1.16.4.
|
||||||
|
|
||||||
## Security update
|
## Security update
|
||||||
|
|
||||||
- __CVE-2023-27487__:
|
- __[CVE-2023-27487](https://github.com/envoyproxy/envoy/security/advisories/GHSA-5375-pq35-hf2g)__: (CVSS Score 8.2, High):
|
||||||
(CVSS Score 8.2, High): Client may fake the header `x-envoy-original-path`.
|
Client may fake the header `x-envoy-original-path`.
|
||||||
|
|
||||||
- __CVE-2023-27488__:
|
- __[CVE-2023-27488](https://github.com/envoyproxy/envoy/security/advisories/GHSA-9g5w-hqr3-w2ph)__: (CVSS Score 5.4, Moderate):
|
||||||
(CVSS Score 5.4, Moderate): gRPC client produces invalid protobuf when an HTTP header with non-UTF8 value is received.
|
gRPC client produces invalid protobuf when an HTTP header with non-UTF8 value is received.
|
||||||
|
|
||||||
- __CVE-2023-27491__:
|
- __[CVE-2023-27491](https://github.com/envoyproxy/envoy/security/advisories/GHSA-5jmv-cw9p-f9rp)__: (CVSS Score 5.4, Moderate):
|
||||||
(CVSS Score 5.4, Moderate): Envoy forwards invalid HTTP/2 and HTTP/3 downstream headers.
|
Envoy forwards invalid HTTP/2 and HTTP/3 downstream headers.
|
||||||
|
|
||||||
- __CVE-2023-27492__:
|
- __[CVE-2023-27492](https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2)__: (CVSS Score 4.8, Moderate):
|
||||||
(CVSS Score 4.8, Moderate): Crash when a large request body is processed in Lua filter.
|
Crash when a large request body is processed in Lua filter.
|
||||||
|
|
||||||
- __CVE-2023-27493__:
|
- __[CVE-2023-27493](https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q)__: (CVSS Score 8.1, High):
|
||||||
(CVSS Score 8.1, High): Envoy doesn't escape HTTP header values.
|
Envoy doesn't escape HTTP header values.
|
||||||
|
|
||||||
- __CVE-2023-27496__:
|
- __[CVE-2023-27496](https://github.com/envoyproxy/envoy/security/advisories/GHSA-j79q-2g66-2xv5)__: (CVSS Score 6.5, Moderate):
|
||||||
(CVSS Score 6.5, Moderate): Crash when a redirect url without a state parameter is received in the OAuth filter.
|
Crash when a redirect url without a state parameter is received in the OAuth filter.
|
||||||
|
|
||||||
# Changes
|
# Changes
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -14,23 +14,23 @@ This release note describes what’s different between Istio 1.17.1 and 1.17.2.
|
||||||
|
|
||||||
## Security update
|
## Security update
|
||||||
|
|
||||||
- __CVE-2023-27487__:
|
- __[CVE-2023-27487](https://github.com/envoyproxy/envoy/security/advisories/GHSA-5375-pq35-hf2g)__: (CVSS Score 8.2, High):
|
||||||
(CVSS Score 8.2, High): Client may fake the header `x-envoy-original-path`.
|
Client may fake the header `x-envoy-original-path`.
|
||||||
|
|
||||||
- __CVE-2023-27488__:
|
- __[CVE-2023-27488](https://github.com/envoyproxy/envoy/security/advisories/GHSA-9g5w-hqr3-w2ph)__: (CVSS Score 5.4, Moderate):
|
||||||
(CVSS Score 5.4, Moderate): gRPC client produces invalid protobuf when an HTTP header with non-UTF8 value is received.
|
gRPC client produces invalid protobuf when an HTTP header with non-UTF8 value is received.
|
||||||
|
|
||||||
- __CVE-2023-27491__:
|
- __[CVE-2023-27491](https://github.com/envoyproxy/envoy/security/advisories/GHSA-5jmv-cw9p-f9rp)__: (CVSS Score 5.4, Moderate):
|
||||||
(CVSS Score 5.4, Moderate): Envoy forwards invalid HTTP/2 and HTTP/3 downstream headers.
|
Envoy forwards invalid HTTP/2 and HTTP/3 downstream headers.
|
||||||
|
|
||||||
- __CVE-2023-27492__:
|
- __[CVE-2023-27492](https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2)__: (CVSS Score 4.8, Moderate):
|
||||||
(CVSS Score 4.8, Moderate): Crash when a large request body is processed in Lua filter.
|
Crash when a large request body is processed in Lua filter.
|
||||||
|
|
||||||
- __CVE-2023-27493__:
|
- __[CVE-2023-27493](https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q)__: (CVSS Score 8.1, High):
|
||||||
(CVSS Score 8.1, High): Envoy doesn't escape HTTP header values.
|
Envoy doesn't escape HTTP header values.
|
||||||
|
|
||||||
- __CVE-2023-27496__:
|
- __[CVE-2023-27496](https://github.com/envoyproxy/envoy/security/advisories/GHSA-j79q-2g66-2xv5)__: (CVSS Score 6.5, Moderate):
|
||||||
(CVSS Score 6.5, Moderate): Crash when a redirect url without a state parameter is received in the OAuth filter.
|
Crash when a redirect url without a state parameter is received in the OAuth filter.
|
||||||
|
|
||||||
## Changes
|
## Changes
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -17,22 +17,22 @@ skip_seealso: true
|
||||||
|
|
||||||
### Envoy CVEs
|
### Envoy CVEs
|
||||||
|
|
||||||
- __CVE-2023-27487__: (CVSS Score 8.2, High):
|
- __[CVE-2023-27487](https://github.com/envoyproxy/envoy/security/advisories/GHSA-5375-pq35-hf2g)__: (CVSS Score 8.2, High):
|
||||||
Client may fake the header `x-envoy-original-path`.
|
Client may fake the header `x-envoy-original-path`.
|
||||||
|
|
||||||
- __CVE-2023-27488__: (CVSS Score 5.4, Moderate):
|
- __[CVE-2023-27488](https://github.com/envoyproxy/envoy/security/advisories/GHSA-9g5w-hqr3-w2ph)__: (CVSS Score 5.4, Moderate):
|
||||||
gRPC client produces invalid protobuf when an HTTP header with non-UTF8 value is received.
|
gRPC client produces invalid protobuf when an HTTP header with non-UTF8 value is received.
|
||||||
|
|
||||||
- __CVE-2023-27491__: (CVSS Score 5.4, Moderate):
|
- __[CVE-2023-27491](https://github.com/envoyproxy/envoy/security/advisories/GHSA-5jmv-cw9p-f9rp)__: (CVSS Score 5.4, Moderate):
|
||||||
Envoy forwards invalid HTTP/2 and HTTP/3 downstream headers.
|
Envoy forwards invalid HTTP/2 and HTTP/3 downstream headers.
|
||||||
|
|
||||||
- __CVE-2023-27492__: (CVSS Score 4.8, Moderate):
|
- __[CVE-2023-27492](https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2)__: (CVSS Score 4.8, Moderate):
|
||||||
Crash when a large request body is processed in Lua filter.
|
Crash when a large request body is processed in Lua filter.
|
||||||
|
|
||||||
- __CVE-2023-27493__: (CVSS Score 8.1, High):
|
- __[CVE-2023-27493](https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q)__: (CVSS Score 8.1, High):
|
||||||
Envoy doesn't escape HTTP header values.
|
Envoy doesn't escape HTTP header values.
|
||||||
|
|
||||||
- __CVE-2023-27496__: (CVSS Score 6.5, Moderate):
|
- __[CVE-2023-27496](https://github.com/envoyproxy/envoy/security/advisories/GHSA-j79q-2g66-2xv5)__: (CVSS Score 6.5, Moderate):
|
||||||
Crash when a redirect url without a state parameter is received in the OAuth filter.
|
Crash when a redirect url without a state parameter is received in the OAuth filter.
|
||||||
|
|
||||||
## Am I Impacted?
|
## Am I Impacted?
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue