1.0.7 and 1.1.2 release info.

This commit is contained in:
mtail 2019-04-04 16:36:57 -07:00
parent e5735d4a3f
commit bb01aa095f
8 changed files with 80 additions and 16 deletions

View File

@ -7,6 +7,8 @@
0.1.x
0.2.x
0.8.x
1.0.x
1.1.x
1.x
10ms
10s
@ -130,6 +132,8 @@ CRD
CRDs
CSRs
Ctrl
CVE
CVEs
D3.js
Datadog
datapath
@ -322,7 +326,10 @@ networking.istio.io
nginx
nodePorts
non-sandboxed
normalization
ns
NUL
NULs
OAuth2
oc
ok
@ -488,6 +495,7 @@ uncommented
Undeploy
unencrypted
unmanaged
unnormalized
unsampled
untrusted
uptime

View File

@ -104,19 +104,13 @@ description: Connect, secure, control, and observe services.
</a>
</div>
</div>
<!--
<div class="ticker-wrap" onclick="go()">
<div class="ticker-wrap" onclick="window.location.href='/about/notes/1.1.2/';">
<div class="ticker">
<div class="item">Upgrade to Istio 1.1.2 Today!</div>
</div>
</div>
<script>
function go() {
window.location.href = "https://istio.io/about/notes/1.1.2/";
}
</script>
-->
<div id="buttons">
<a title="Install Istio on Kubernetes today." class="btn" href="/docs/setup/kubernetes/">GET STARTED</a>
<a title="Dive deeper to understand what Istio is and how it works." class="btn" href="/docs/concepts/what-is-istio/">LEARN MORE</a>

View File

@ -3,7 +3,6 @@ title: Istio 1.0.7
publishdate: 2019-04-05
icon: notes
layout: release-note
draft: true
---
This release includes an important security update. All customers using prior versions of Istio are advised to upgrade immediately.

View File

@ -3,7 +3,6 @@ title: Istio 1.1.2
publishdate: 2019-04-05
icon: notes
layout: release-note
draft: true
---
This release includes an important security update. All customers using prior versions of Istio are advised to upgrade immediately.

View File

@ -4,12 +4,77 @@ subtitle: Important Security Update
description: Istio 1.1.2 and 1.0.7 patch releases.
publishdate: 2019-04-05
attribution: The Istio Team
draft: true
---
We're announcing immediate availability of Istio 1.1.2 and Istio 1.0.7 which contain some important security updates. Please see below for details.
{{< announcement_links "1.1.2" >}}
{{< announcement_links "1.0.7" >}}
## Issue impact
## Security update
Two security vulnerabilities have recently been identified in the Envoy proxy
([CVE 2019-9900](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9900) and [CVE 2019-9901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9901)). The
vulnerabilities have now been patched in Envoy version 1.9.1, and correspondingly in the Envoy builds
embedded in Istio 1.1.2 and Istio 1.0.7. Since Envoy is an integral part of Istio, users are advised to update Istio
immediately to mitigate security risks arising from these vulnerabilities.
The vulnerabilities are centered on the fact that Envoy did not normalize HTTP URI paths and did not fully validate HTTP/1.1 header values. These
vulnerabilities impact Istio features that rely on Envoy to enforce any of authorization, routing, or rate limiting.
## Affected Istio releases
The following Istio releases are vulnerable:
- 1.1, 1.1.1
- These releases can be patched to Istio 1.1.2.
- 1.1.2 is built from the same source as 1.1.1 with the addition of Envoy patches minimally sufficient to address the CVEs.
- 1.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6
- These releases can be patched to Istio 1.0.7
- 1.0.7 is built from the same source as 1.0.6 with the addition of Envoy patches minimally sufficient to address the CVEs.
- 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8
- These releases are no longer supported and will not be patched. Please upgrade to a supported release with the necessary fixes.
## Vulnerability impact
[CVE 2019-9900](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9900) and [CVE 2019-9901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9901)
allow remote attackers access to unauthorized resources by using specially crafted request URI paths (9901) and NUL bytes in
HTTP/1.1 headers (9900), potentially circumventing DoS prevention systems such as rate limiting, or routing to a unexposed upstream system. Refer to
[issue 6434](https://github.com/envoyproxy/envoy/issues/6434)
and [issue 6435](https://github.com/envoyproxy/envoy/issues/6435) for more information.
As Istio is based on Envoy, Istio customers can be affected by these vulnerabilities based on whether paths and request headers are used within Istio
policies or routing rules and how the backend HTTP implementation resolves them. If prefix path matching rules are used by Mixer or by Istio authorization
policies or the routing rules, an attacker could exploit these vulnerabilities to gain access to unauthorized paths on certain HTTP backends.
## Mitigation
Eliminating the vulnerabilities requires updating to a corrected version of Envoy. Weve incorporated the necessary updates in the latest Istio patch releases.
For Istio 1.1.x deployments: update to a minimum of [Istio 1.1.2](/about/notes/1.1.2)
For Istio 1.0.x deployments: update to a minimum of [Istio 1.0.7](/about/notes/1.0.7)
While Envoy 1.9.1 requires opting in to path normalization to address CVE 2019-9901, the version of Envoy embedded in Istio 1.1.2 and 1.0.7 enables path
normalization by default.
## Detection of NUL header exploit
Based on current information, this only affects HTTP/1.1 traffic. If this is not structurally possible in your network or configuration, then it is unlikely
that this vulnerability applies.
File-based access logging uses the `c_str()` representation for header values, as does gRPC access logging, so there will be no trivial detection via
Envoys access logs by scanning for NUL. Instead, operators might look for inconsistencies in logs between the routing that Envoy performs and the logic
intended in the `RouteConfiguration`.
External authorization and rate limit services can check for NULs in headers. Backend servers might have sufficient logging to detect NULs or unintended
access; its likely that many will simply reject NULs in this scenario via 400 Bad Request, as per RFC 7230.
## Detection of path traversal exploit
Envoys access logs (whether file-based or gRPC) will contain the unnormalized path, so it is possible to examine these logs to detect suspicious patterns and
requests that are incongruous with the intended operator configuration intent. In addition, unnormalized paths are available at `ext_authz`, rate limiting
and backend servers for log inspection.

View File

@ -2,7 +2,6 @@
title: Istio 1.1.2
publishdate: 2019-04-05
icon: notes
draft: true
---
本次发布中包含了一个重要的安全更新。建议所有使用以前版本 Istio 的用户立即升级。

View File

@ -2,7 +2,7 @@
version: "1.1"
# The full Istio version identifier the docs describe
full_version: "1.1.1"
full_version: "1.1.2"
# The year to display in copyright notices
copyright_year: 2019

View File

@ -2,10 +2,10 @@
url: https://preliminary.istio.io
- name: "1.1"
url: https://istio.io
latest_patch: 1.1.1
latest_patch: 1.1.2
- name: "1.0"
url: https://archive.istio.io/v1.0
latest_patch: 1.0.6
latest_patch: 1.0.7
- name: "0.8"
url: https://archive.istio.io/v0.8
- name: "0.7"