mirror of https://github.com/istio/istio.io.git
* slatekangaroo release notes * fix spelling and args Co-authored-by: mandarjog <mjog@google.com>
This commit is contained in:
parent
a6e2a7a954
commit
ff262acb69
|
@ -190,9 +190,13 @@ CVE-2020-8843
|
|||
CVE-2020-8659
|
||||
CVE-2020-8660
|
||||
CVE-2020-8661
|
||||
CVE-2020-8663
|
||||
CVE-2020-8664
|
||||
CVE-2020-10739
|
||||
CVE-2020-11080
|
||||
CVE-2020-12603
|
||||
CVE-2020-12604
|
||||
CVE-2020-12605
|
||||
CVE-2020-13379
|
||||
CVEs
|
||||
cves
|
||||
|
|
|
@ -0,0 +1,34 @@
|
|||
---
|
||||
title: Announcing Istio 1.5.7
|
||||
linktitle: 1.5.7
|
||||
subtitle: Patch Release
|
||||
description: Istio 1.5.7 security release.
|
||||
publishdate: 2020-06-30
|
||||
release: 1.5.7
|
||||
aliases:
|
||||
- /news/announcing-1.5.7
|
||||
---
|
||||
|
||||
This release fixes the security vulnerability described in [our June 30th, 2020 news post](/news/security/istio-security-2020-007).
|
||||
|
||||
This release note describes what's different between Istio 1.5.7 and Istio 1.5.6.
|
||||
|
||||
{{< relnote >}}
|
||||
|
||||
## Security update
|
||||
|
||||
* __[CVE-2020-12603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12603)__:
|
||||
By sending a specially crafted packet, an attacker could cause Envoy to consume excessive amounts of memory when proxying HTTP/2 requests or responses.
|
||||
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||
|
||||
* __[CVE-2020-12605](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12605)__:
|
||||
An attacker could cause Envoy to consume excessive amounts of memory when processing specially crafted HTTP/1.1 packets.
|
||||
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||
|
||||
* __[CVE-2020-8663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8663)__:
|
||||
An attacker could cause Envoy to exhaust file descriptors when accepting too many connections.
|
||||
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||
|
||||
* __[CVE-2020-12604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12604)__:
|
||||
An attacker could cause increased memory usage when processing specially crafted packets.
|
||||
* CVSS Score: 5.3 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
|
@ -0,0 +1,34 @@
|
|||
---
|
||||
title: Announcing Istio 1.6.4
|
||||
linktitle: 1.6.4
|
||||
subtitle: Patch Release
|
||||
description: Istio 1.6.4 security release.
|
||||
publishdate: 2020-06-30
|
||||
release: 1.6.4
|
||||
aliases:
|
||||
- /news/announcing-1.6.4
|
||||
---
|
||||
|
||||
This release fixes the security vulnerability described in [our June 30th, 2020 news post](/news/security/istio-security-2020-007).
|
||||
|
||||
This release note describes what's different between Istio 1.6.4 and Istio 1.6.3.
|
||||
|
||||
{{< relnote >}}
|
||||
|
||||
## Security update
|
||||
|
||||
* __[CVE-2020-12603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12603)__:
|
||||
By sending a specially crafted packet, an attacker could cause Envoy to consume excessive amounts of memory when proxying HTTP/2 requests or responses.
|
||||
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||
|
||||
* __[CVE-2020-12605](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12605)__:
|
||||
An attacker could cause Envoy to consume excessive amounts of memory when processing specially crafted HTTP/1.1 packets.
|
||||
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||
|
||||
* __[CVE-2020-8663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8663)__:
|
||||
An attacker could cause Envoy to exhaust file descriptors when accepting too many connections.
|
||||
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||
|
||||
* __[CVE-2020-12604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12604)__:
|
||||
An attacker could cause increased memory usage when processing specially crafted packets.
|
||||
* CVSS Score: 5.3 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
|
@ -0,0 +1,19 @@
|
|||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: istio-custom-bootstrap-config
|
||||
data:
|
||||
custom_bootstrap.json: |
|
||||
{
|
||||
"layered_runtime": {
|
||||
"layers": [
|
||||
{"name": "static_layer_0",
|
||||
"static_layer": {
|
||||
"overload": {
|
||||
"global_downstream_max_connections": 250000
|
||||
}
|
||||
}},
|
||||
{"name": "admin", "admin_layer": {}}
|
||||
]
|
||||
}
|
||||
}
|
|
@ -0,0 +1,18 @@
|
|||
spec:
|
||||
template:
|
||||
spec:
|
||||
containers:
|
||||
- name: istio-proxy
|
||||
env:
|
||||
- name: ISTIO_BOOTSTRAP_OVERRIDE
|
||||
value: /etc/istio/custom-bootstrap/custom_bootstrap.json
|
||||
volumeMounts:
|
||||
- mountPath: /etc/istio/custom-bootstrap
|
||||
name: custom-bootstrap-volume
|
||||
readOnly: true
|
||||
volumes:
|
||||
- configMap:
|
||||
name: istio-custom-bootstrap-config
|
||||
defaultMode: 420
|
||||
optional: false
|
||||
name: custom-bootstrap-volume
|
|
@ -0,0 +1,81 @@
|
|||
---
|
||||
title: ISTIO-SECURITY-2020-007
|
||||
subtitle: Security Bulletin
|
||||
description: Multiple denial of service vulnerabilities in Envoy.
|
||||
cves: [CVE-2020-12603, CVE-2020-12605, CVE-2020-8663, CVE-2020-12604]
|
||||
cvss: "7.5"
|
||||
vector: "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
|
||||
releases: ["1.5 to 1.5.6", "1.6 to 1.6.3"]
|
||||
publishdate: 2020-06-30
|
||||
keywords: [CVE]
|
||||
skip_seealso: true
|
||||
---
|
||||
|
||||
{{< security_bulletin >}}
|
||||
|
||||
Envoy, and subsequently Istio, are vulnerable to four newly discovered vulnerabilities:
|
||||
|
||||
* __[CVE-2020-12603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12603)__:
|
||||
By sending a specially crafted packet, an attacker could cause Envoy to consume excessive amounts of memory when proxying HTTP/2 requests or responses.
|
||||
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||
|
||||
* __[CVE-2020-12605](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12605)__:
|
||||
An attacker could cause Envoy to consume excessive amounts of memory when processing specially crafted HTTP/1.1 packets.
|
||||
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||
|
||||
* __[CVE-2020-8663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8663)__:
|
||||
An attacker could cause Envoy to exhaust file descriptors when accepting too many connections.
|
||||
* CVSS Score: 7.0 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||
|
||||
* __[CVE-2020-12604](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12604)__:
|
||||
An attacker could cause increased memory usage when processing specially crafted packets.
|
||||
* CVSS Score: 5.3 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1)
|
||||
|
||||
## Mitigation
|
||||
|
||||
* For Istio 1.5.x deployments: update to [Istio 1.5.7](/news/releases/1.5.x/announcing-1.5.7) or later.
|
||||
* For Istio 1.6.x deployments: update to [Istio 1.6.4](/news/releases/1.6.x/announcing-1.6.4) or later.
|
||||
|
||||
{{< warning >}}
|
||||
You must take the following additional steps to mitigate CVE-2020-8663.
|
||||
{{< /warning >}}
|
||||
|
||||
CVE-2020-8663 is addressed in Envoy by adding a configurable limit on [downstream connections](https://www.envoyproxy.io/docs/envoy/v1.14.3/configuration/operations/overload_manager/overload_manager#limiting-active-connections). The limit must be configured to mitigate this vulnerability. Perform the following steps to configure limits at the ingress gateway.
|
||||
|
||||
1. Create a config map by downloading [custom-bootstrap-runtime.yaml](/news/security/istio-security-2020-007/custom-bootstrap-runtime.yaml). Update `global_downstream_max_connections` in the config map according to the number of concurrent connections needed by individual gateway instances in your deployment. Once the limit is reached, Envoy will start rejecting tcp connections.
|
||||
|
||||
{{< text bash >}}
|
||||
$ kubectl -n istio-system apply -f custom-bootstrap-runtime.yaml
|
||||
{{< /text >}}
|
||||
|
||||
1. Patch the ingress gateway deployment to use the above configuration. Download [gateway-patch.yaml](/news/security/istio-security-2020-007/gateway-patch.yaml) and apply it using the following command.
|
||||
|
||||
{{< text bash >}}
|
||||
$ kubectl --namespace istio-system patch deployment istio-ingressgateway --patch "$(cat gateway-patch.yaml)"
|
||||
{{< /text >}}
|
||||
|
||||
1. Confirm that the new limits are in place.
|
||||
|
||||
{{< text bash >}}
|
||||
$ ISTIO_INGRESS_PODNAME=$(kubectl get pods -l app=istio-ingressgateway -n istio-system -o jsonpath="{.items[0].metadata.name}")
|
||||
$ kubectl --namespace istio-system exec -i -t ${ISTIO_INGRESS_PODNAME} -c istio-proxy -- curl http://localhost:15000/runtime
|
||||
|
||||
{
|
||||
"entries": {
|
||||
"overload.global_downstream_max_connections": {
|
||||
"layer_values": [
|
||||
"",
|
||||
"250000",
|
||||
""
|
||||
],
|
||||
"final_value": "250000"
|
||||
}
|
||||
},
|
||||
"layers": [
|
||||
"static_layer_0",
|
||||
"admin"
|
||||
]
|
||||
}
|
||||
{{< /text >}}
|
||||
|
||||
{{< boilerplate "security-vulnerability" >}}
|
Loading…
Reference in New Issue