mirror of https://github.com/istio/istio.io.git
CVE 2020 007 (slatekangaroo) release notes (#7648)
* slatekangaroo release notes * fix spelling and args
This commit is contained in:
parent
548fd1d7a4
commit
93f81e6255
|
@ -189,9 +189,13 @@ CVE-2020-8843
|
||||||
CVE-2020-8659
|
CVE-2020-8659
|
||||||
CVE-2020-8660
|
CVE-2020-8660
|
||||||
CVE-2020-8661
|
CVE-2020-8661
|
||||||
|
CVE-2020-8663
|
||||||
CVE-2020-8664
|
CVE-2020-8664
|
||||||
CVE-2020-10739
|
CVE-2020-10739
|
||||||
CVE-2020-11080
|
CVE-2020-11080
|
||||||
|
CVE-2020-12603
|
||||||
|
CVE-2020-12604
|
||||||
|
CVE-2020-12605
|
||||||
CVE-2020-13379
|
CVE-2020-13379
|
||||||
CVEs
|
CVEs
|
||||||
cves
|
cves
|
||||||
|
|
|
@ -0,0 +1,34 @@
|
||||||
|
---
|
||||||
|
title: Announcing Istio 1.5.7
|
||||||
|
linktitle: 1.5.7
|
||||||
|
subtitle: Patch Release
|
||||||
|
description: Istio 1.5.7 security release.
|
||||||
|
publishdate: 2020-06-30
|
||||||
|
release: 1.5.7
|
||||||
|
aliases:
|
||||||
|
- /news/announcing-1.5.7
|
||||||
|
---
|
||||||
|
|
||||||
|
This release fixes the security vulnerability described in [our June 30th, 2020 news post](/news/security/istio-security-2020-007).
|
||||||
|
|
||||||
|
This release note describes what's different between Istio 1.5.7 and Istio 1.5.6.
|
||||||
|
|
||||||
|
{{< relnote >}}
|
||||||
|
|
||||||
|
## Security update
|
||||||
|
|
||||||
|
* __[CVE-2020-12603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12603)__:
|
||||||
|
By sending a specially crafted packet, an attacker could cause Envoy to consume excessive amounts of memory when proxying HTTP/2 requests or responses.
|
||||||
|
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||||
|
|
||||||
|
* __[CVE-2020-12605](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12605)__:
|
||||||
|
An attacker could cause Envoy to consume excessive amounts of memory when processing specially crafted HTTP/1.1 packets.
|
||||||
|
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||||
|
|
||||||
|
* __[CVE-2020-8663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8663)__:
|
||||||
|
An attacker could cause Envoy to exhaust file descriptors when accepting too many connections.
|
||||||
|
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||||
|
|
||||||
|
* __[CVE-2020-12604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12604)__:
|
||||||
|
An attacker could cause increased memory usage when processing specially crafted packets.
|
||||||
|
* CVSS Score: 5.3 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
|
@ -0,0 +1,34 @@
|
||||||
|
---
|
||||||
|
title: Announcing Istio 1.6.4
|
||||||
|
linktitle: 1.6.4
|
||||||
|
subtitle: Patch Release
|
||||||
|
description: Istio 1.6.4 security release.
|
||||||
|
publishdate: 2020-06-30
|
||||||
|
release: 1.6.4
|
||||||
|
aliases:
|
||||||
|
- /news/announcing-1.6.4
|
||||||
|
---
|
||||||
|
|
||||||
|
This release fixes the security vulnerability described in [our June 30th, 2020 news post](/news/security/istio-security-2020-007).
|
||||||
|
|
||||||
|
This release note describes what's different between Istio 1.6.4 and Istio 1.6.3.
|
||||||
|
|
||||||
|
{{< relnote >}}
|
||||||
|
|
||||||
|
## Security update
|
||||||
|
|
||||||
|
* __[CVE-2020-12603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12603)__:
|
||||||
|
By sending a specially crafted packet, an attacker could cause Envoy to consume excessive amounts of memory when proxying HTTP/2 requests or responses.
|
||||||
|
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||||
|
|
||||||
|
* __[CVE-2020-12605](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12605)__:
|
||||||
|
An attacker could cause Envoy to consume excessive amounts of memory when processing specially crafted HTTP/1.1 packets.
|
||||||
|
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||||
|
|
||||||
|
* __[CVE-2020-8663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8663)__:
|
||||||
|
An attacker could cause Envoy to exhaust file descriptors when accepting too many connections.
|
||||||
|
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||||
|
|
||||||
|
* __[CVE-2020-12604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12604)__:
|
||||||
|
An attacker could cause increased memory usage when processing specially crafted packets.
|
||||||
|
* CVSS Score: 5.3 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
|
@ -0,0 +1,19 @@
|
||||||
|
apiVersion: v1
|
||||||
|
kind: ConfigMap
|
||||||
|
metadata:
|
||||||
|
name: istio-custom-bootstrap-config
|
||||||
|
data:
|
||||||
|
custom_bootstrap.json: |
|
||||||
|
{
|
||||||
|
"layered_runtime": {
|
||||||
|
"layers": [
|
||||||
|
{"name": "static_layer_0",
|
||||||
|
"static_layer": {
|
||||||
|
"overload": {
|
||||||
|
"global_downstream_max_connections": 250000
|
||||||
|
}
|
||||||
|
}},
|
||||||
|
{"name": "admin", "admin_layer": {}}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,18 @@
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: istio-proxy
|
||||||
|
env:
|
||||||
|
- name: ISTIO_BOOTSTRAP_OVERRIDE
|
||||||
|
value: /etc/istio/custom-bootstrap/custom_bootstrap.json
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /etc/istio/custom-bootstrap
|
||||||
|
name: custom-bootstrap-volume
|
||||||
|
readOnly: true
|
||||||
|
volumes:
|
||||||
|
- configMap:
|
||||||
|
name: istio-custom-bootstrap-config
|
||||||
|
defaultMode: 420
|
||||||
|
optional: false
|
||||||
|
name: custom-bootstrap-volume
|
|
@ -0,0 +1,81 @@
|
||||||
|
---
|
||||||
|
title: ISTIO-SECURITY-2020-007
|
||||||
|
subtitle: Security Bulletin
|
||||||
|
description: Multiple denial of service vulnerabilities in Envoy.
|
||||||
|
cves: [CVE-2020-12603, CVE-2020-12605, CVE-2020-8663, CVE-2020-12604]
|
||||||
|
cvss: "7.5"
|
||||||
|
vector: "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
|
||||||
|
releases: ["1.5 to 1.5.6", "1.6 to 1.6.3"]
|
||||||
|
publishdate: 2020-06-30
|
||||||
|
keywords: [CVE]
|
||||||
|
skip_seealso: true
|
||||||
|
---
|
||||||
|
|
||||||
|
{{< security_bulletin >}}
|
||||||
|
|
||||||
|
Envoy, and subsequently Istio, are vulnerable to four newly discovered vulnerabilities:
|
||||||
|
|
||||||
|
* __[CVE-2020-12603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12603)__:
|
||||||
|
By sending a specially crafted packet, an attacker could cause Envoy to consume excessive amounts of memory when proxying HTTP/2 requests or responses.
|
||||||
|
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||||
|
|
||||||
|
* __[CVE-2020-12605](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12605)__:
|
||||||
|
An attacker could cause Envoy to consume excessive amounts of memory when processing specially crafted HTTP/1.1 packets.
|
||||||
|
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||||
|
|
||||||
|
* __[CVE-2020-8663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8663)__:
|
||||||
|
An attacker could cause Envoy to exhaust file descriptors when accepting too many connections.
|
||||||
|
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||||
|
|
||||||
|
* __[CVE-2020-12604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12604)__:
|
||||||
|
An attacker could cause increased memory usage when processing specially crafted packets.
|
||||||
|
* CVSS Score: 5.3 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||||
|
|
||||||
|
## Mitigation
|
||||||
|
|
||||||
|
* For Istio 1.5.x deployments: update to [Istio 1.5.7](/news/releases/1.5.x/announcing-1.5.7) or later.
|
||||||
|
* For Istio 1.6.x deployments: update to [Istio 1.6.4](/news/releases/1.6.x/announcing-1.6.4) or later.
|
||||||
|
|
||||||
|
{{< warning >}}
|
||||||
|
You must take the following additional steps to mitigate CVE-2020-8663.
|
||||||
|
{{< /warning >}}
|
||||||
|
|
||||||
|
CVE-2020-8663 is addressed in Envoy by adding a configurable limit on [downstream connections](https://www.envoyproxy.io/docs/envoy/v1.14.3/configuration/operations/overload_manager/overload_manager#limiting-active-connections). The limit must be configured to mitigate this vulnerability. Perform the following steps to configure limits at the ingress gateway.
|
||||||
|
|
||||||
|
1. Create a config map by downloading [custom-bootstrap-runtime.yaml](/news/security/istio-security-2020-007/custom-bootstrap-runtime.yaml). Update `global_downstream_max_connections` in the config map according to the number of concurrent connections needed by individual gateway instances in your deployment. Once the limit is reached, Envoy will start rejecting tcp connections.
|
||||||
|
|
||||||
|
{{< text bash >}}
|
||||||
|
$ kubectl -n istio-system apply -f custom-bootstrap-runtime.yaml
|
||||||
|
{{< /text >}}
|
||||||
|
|
||||||
|
1. Patch the ingress gateway deployment to use the above configuration. Download [gateway-patch.yaml](/news/security/istio-security-2020-007/gateway-patch.yaml) and apply it using the following command.
|
||||||
|
|
||||||
|
{{< text bash >}}
|
||||||
|
$ kubectl --namespace istio-system patch deployment istio-ingressgateway --patch "$(cat gateway-patch.yaml)"
|
||||||
|
{{< /text >}}
|
||||||
|
|
||||||
|
1. Confirm that the new limits are in place.
|
||||||
|
|
||||||
|
{{< text bash >}}
|
||||||
|
$ ISTIO_INGRESS_PODNAME=$(kubectl get pods -l app=istio-ingressgateway -n istio-system -o jsonpath="{.items[0].metadata.name}")
|
||||||
|
$ kubectl --namespace istio-system exec -i -t ${ISTIO_INGRESS_PODNAME} -c istio-proxy -- curl http://localhost:15000/runtime
|
||||||
|
|
||||||
|
{
|
||||||
|
"entries": {
|
||||||
|
"overload.global_downstream_max_connections": {
|
||||||
|
"layer_values": [
|
||||||
|
"",
|
||||||
|
"250000",
|
||||||
|
""
|
||||||
|
],
|
||||||
|
"final_value": "250000"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"layers": [
|
||||||
|
"static_layer_0",
|
||||||
|
"admin"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
{{< /text >}}
|
||||||
|
|
||||||
|
{{< boilerplate "security-vulnerability" >}}
|
|
@ -2,7 +2,7 @@
|
||||||
version: "1.6"
|
version: "1.6"
|
||||||
|
|
||||||
# The full Istio version identifier the docs describe
|
# The full Istio version identifier the docs describe
|
||||||
full_version: "1.6.3"
|
full_version: "1.6.4"
|
||||||
|
|
||||||
# The previous Istio version identifier the docs describe, used for upgrade documentation
|
# The previous Istio version identifier the docs describe, used for upgrade documentation
|
||||||
previous_version: "1.5"
|
previous_version: "1.5"
|
||||||
|
|
Loading…
Reference in New Issue