mirror of https://github.com/istio/istio.io.git
1.0.7 and 1.1.2 release info.
This commit is contained in:
parent
e5735d4a3f
commit
bb01aa095f
|
@ -7,6 +7,8 @@
|
|||
0.1.x
|
||||
0.2.x
|
||||
0.8.x
|
||||
1.0.x
|
||||
1.1.x
|
||||
1.x
|
||||
10ms
|
||||
10s
|
||||
|
@ -130,6 +132,8 @@ CRD
|
|||
CRDs
|
||||
CSRs
|
||||
Ctrl
|
||||
CVE
|
||||
CVEs
|
||||
D3.js
|
||||
Datadog
|
||||
datapath
|
||||
|
@ -322,7 +326,10 @@ networking.istio.io
|
|||
nginx
|
||||
nodePorts
|
||||
non-sandboxed
|
||||
normalization
|
||||
ns
|
||||
NUL
|
||||
NULs
|
||||
OAuth2
|
||||
oc
|
||||
ok
|
||||
|
@ -488,6 +495,7 @@ uncommented
|
|||
Undeploy
|
||||
unencrypted
|
||||
unmanaged
|
||||
unnormalized
|
||||
unsampled
|
||||
untrusted
|
||||
uptime
|
||||
|
|
|
@ -104,19 +104,13 @@ description: Connect, secure, control, and observe services.
|
|||
</a>
|
||||
</div>
|
||||
</div>
|
||||
<!--
|
||||
<div class="ticker-wrap" onclick="go()">
|
||||
|
||||
<div class="ticker-wrap" onclick="window.location.href='/about/notes/1.1.2/';">
|
||||
<div class="ticker">
|
||||
<div class="item">Upgrade to Istio 1.1.2 Today!</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<script>
|
||||
function go() {
|
||||
window.location.href = "https://istio.io/about/notes/1.1.2/";
|
||||
}
|
||||
</script>
|
||||
-->
|
||||
<div id="buttons">
|
||||
<a title="Install Istio on Kubernetes today." class="btn" href="/docs/setup/kubernetes/">GET STARTED</a>
|
||||
<a title="Dive deeper to understand what Istio is and how it works." class="btn" href="/docs/concepts/what-is-istio/">LEARN MORE</a>
|
||||
|
|
|
@ -3,7 +3,6 @@ title: Istio 1.0.7
|
|||
publishdate: 2019-04-05
|
||||
icon: notes
|
||||
layout: release-note
|
||||
draft: true
|
||||
---
|
||||
|
||||
This release includes an important security update. All customers using prior versions of Istio are advised to upgrade immediately.
|
||||
|
|
|
@ -3,7 +3,6 @@ title: Istio 1.1.2
|
|||
publishdate: 2019-04-05
|
||||
icon: notes
|
||||
layout: release-note
|
||||
draft: true
|
||||
---
|
||||
|
||||
This release includes an important security update. All customers using prior versions of Istio are advised to upgrade immediately.
|
||||
|
|
|
@ -4,12 +4,77 @@ subtitle: Important Security Update
|
|||
description: Istio 1.1.2 and 1.0.7 patch releases.
|
||||
publishdate: 2019-04-05
|
||||
attribution: The Istio Team
|
||||
draft: true
|
||||
---
|
||||
|
||||
We're announcing immediate availability of Istio 1.1.2 and Istio 1.0.7 which contain some important security updates. Please see below for details.
|
||||
|
||||
{{< announcement_links "1.1.2" >}}
|
||||
|
||||
{{< announcement_links "1.0.7" >}}
|
||||
|
||||
## Issue impact
|
||||
## Security update
|
||||
|
||||
Two security vulnerabilities have recently been identified in the Envoy proxy
|
||||
([CVE 2019-9900](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9900) and [CVE 2019-9901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9901)). The
|
||||
vulnerabilities have now been patched in Envoy version 1.9.1, and correspondingly in the Envoy builds
|
||||
embedded in Istio 1.1.2 and Istio 1.0.7. Since Envoy is an integral part of Istio, users are advised to update Istio
|
||||
immediately to mitigate security risks arising from these vulnerabilities.
|
||||
|
||||
The vulnerabilities are centered on the fact that Envoy did not normalize HTTP URI paths and did not fully validate HTTP/1.1 header values. These
|
||||
vulnerabilities impact Istio features that rely on Envoy to enforce any of authorization, routing, or rate limiting.
|
||||
|
||||
## Affected Istio releases
|
||||
|
||||
The following Istio releases are vulnerable:
|
||||
|
||||
- 1.1, 1.1.1
|
||||
- These releases can be patched to Istio 1.1.2.
|
||||
- 1.1.2 is built from the same source as 1.1.1 with the addition of Envoy patches minimally sufficient to address the CVEs.
|
||||
|
||||
- 1.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6
|
||||
- These releases can be patched to Istio 1.0.7
|
||||
- 1.0.7 is built from the same source as 1.0.6 with the addition of Envoy patches minimally sufficient to address the CVEs.
|
||||
|
||||
- 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8
|
||||
- These releases are no longer supported and will not be patched. Please upgrade to a supported release with the necessary fixes.
|
||||
|
||||
## Vulnerability impact
|
||||
|
||||
[CVE 2019-9900](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9900) and [CVE 2019-9901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9901)
|
||||
allow remote attackers access to unauthorized resources by using specially crafted request URI paths (9901) and NUL bytes in
|
||||
HTTP/1.1 headers (9900), potentially circumventing DoS prevention systems such as rate limiting, or routing to a unexposed upstream system. Refer to
|
||||
[issue 6434](https://github.com/envoyproxy/envoy/issues/6434)
|
||||
and [issue 6435](https://github.com/envoyproxy/envoy/issues/6435) for more information.
|
||||
|
||||
As Istio is based on Envoy, Istio customers can be affected by these vulnerabilities based on whether paths and request headers are used within Istio
|
||||
policies or routing rules and how the backend HTTP implementation resolves them. If prefix path matching rules are used by Mixer or by Istio authorization
|
||||
policies or the routing rules, an attacker could exploit these vulnerabilities to gain access to unauthorized paths on certain HTTP backends.
|
||||
|
||||
## Mitigation
|
||||
|
||||
Eliminating the vulnerabilities requires updating to a corrected version of Envoy. We’ve incorporated the necessary updates in the latest Istio patch releases.
|
||||
|
||||
For Istio 1.1.x deployments: update to a minimum of [Istio 1.1.2](/about/notes/1.1.2)
|
||||
|
||||
For Istio 1.0.x deployments: update to a minimum of [Istio 1.0.7](/about/notes/1.0.7)
|
||||
|
||||
While Envoy 1.9.1 requires opting in to path normalization to address CVE 2019-9901, the version of Envoy embedded in Istio 1.1.2 and 1.0.7 enables path
|
||||
normalization by default.
|
||||
|
||||
## Detection of NUL header exploit
|
||||
|
||||
Based on current information, this only affects HTTP/1.1 traffic. If this is not structurally possible in your network or configuration, then it is unlikely
|
||||
that this vulnerability applies.
|
||||
|
||||
File-based access logging uses the `c_str()` representation for header values, as does gRPC access logging, so there will be no trivial detection via
|
||||
Envoy’s access logs by scanning for NUL. Instead, operators might look for inconsistencies in logs between the routing that Envoy performs and the logic
|
||||
intended in the `RouteConfiguration`.
|
||||
|
||||
External authorization and rate limit services can check for NULs in headers. Backend servers might have sufficient logging to detect NULs or unintended
|
||||
access; it’s likely that many will simply reject NULs in this scenario via 400 Bad Request, as per RFC 7230.
|
||||
|
||||
## Detection of path traversal exploit
|
||||
|
||||
Envoy’s access logs (whether file-based or gRPC) will contain the unnormalized path, so it is possible to examine these logs to detect suspicious patterns and
|
||||
requests that are incongruous with the intended operator configuration intent. In addition, unnormalized paths are available at `ext_authz`, rate limiting
|
||||
and backend servers for log inspection.
|
||||
|
|
|
@ -2,7 +2,6 @@
|
|||
title: Istio 1.1.2
|
||||
publishdate: 2019-04-05
|
||||
icon: notes
|
||||
draft: true
|
||||
---
|
||||
|
||||
本次发布中包含了一个重要的安全更新。建议所有使用以前版本 Istio 的用户立即升级。
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
version: "1.1"
|
||||
|
||||
# The full Istio version identifier the docs describe
|
||||
full_version: "1.1.1"
|
||||
full_version: "1.1.2"
|
||||
|
||||
# The year to display in copyright notices
|
||||
copyright_year: 2019
|
||||
|
|
|
@ -2,10 +2,10 @@
|
|||
url: https://preliminary.istio.io
|
||||
- name: "1.1"
|
||||
url: https://istio.io
|
||||
latest_patch: 1.1.1
|
||||
latest_patch: 1.1.2
|
||||
- name: "1.0"
|
||||
url: https://archive.istio.io/v1.0
|
||||
latest_patch: 1.0.6
|
||||
latest_patch: 1.0.7
|
||||
- name: "0.8"
|
||||
url: https://archive.istio.io/v0.8
|
||||
- name: "0.7"
|
||||
|
|
Loading…
Reference in New Issue