Bug 2061638 (CVE-2022-24726) - CVE-2022-24726 istio: Unauthenticated control plane denial of service attack due to stack exhaustion
Summary: CVE-2022-24726 istio: Unauthenticated control plane denial of service attack ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-24726
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2061639
TreeView+ depends on / blocked
 
Reported: 2022-03-08 06:04 UTC by Avinash Hanwate
Modified: 2023-09-01 03:03 UTC (History)
7 users (show)

Fixed In Version: istio 1.11.8, istio 1.12.5, istio 1.13.2
Doc Type: If docs needed, set a value
Doc Text:
A stack exhaustion flaw was found in the Istio control plane. This flaw allows a remote unauthenticated attacker to send a specially crafted or oversized message to crash the control plane process, resulting in a denial of service condition.
Clone Of:
Environment:
Last Closed: 2022-04-07 20:59:38 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:1275 0 None None None 2022-04-07 18:04:03 UTC
Red Hat Product Errata RHSA-2022:1276 0 None None None 2022-04-07 17:59:27 UTC

Description Avinash Hanwate 2022-03-08 06:04:05 UTC
The Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted or oversized message, to crash the control plane process. This can be exploited when the Kubernetes validating or mutating webhook service is exposed publicly. This endpoint is served over TLS port 15017, but does not require any authentication from an attacker.

Security advisory: https://istio.io/latest/news/security/istio-security-2022-004.

Upstream commits/PRs:
 
[master]
https://github.com/istio/istio/commit/40f6caed64e6869a5589f2e2f38f1e64063fd930

[1.11]
https://github.com/istio/istio/pull/37804
https://github.com/istio/istio/commit/458feb160756d6b38f1cee4ddb7a40ff50aaa713

[1.12]
https://github.com/istio/istio/pull/37791
https://github.com/istio/istio/commit/e9c3781bd4097f94289b18ecb5a657438f47c9a4

[1.13]
https://github.com/istio/istio/pull/37792
https://github.com/istio/istio/commit/6ca5055a4db6695ef5504eabdfde3799f2ea91fd

Comment 7 errata-xmlrpc 2022-04-07 17:59:25 UTC
This issue has been addressed in the following products:

  OpenShift Service Mesh 2.0

Via RHSA-2022:1276 https://access.redhat.com/errata/RHSA-2022:1276

Comment 8 errata-xmlrpc 2022-04-07 18:04:00 UTC
This issue has been addressed in the following products:

  OpenShift Service Mesh 2.1

Via RHSA-2022:1275 https://access.redhat.com/errata/RHSA-2022:1275

Comment 9 Product Security DevOps Team 2022-04-07 20:59:37 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-24726


Note You need to log in before you can comment on or make changes to this bug.