[ASA-202107-3] istio: information disclosure

Jonas Witschel diabonas at archlinux.org
Sat Jul 3 16:24:43 UTC 2021

Arch Linux Security Advisory ASA-202107-3

Severity: Critical
Date    : 2021-07-01
CVE-ID  : CVE-2021-34824
Package : istio
Type    : information disclosure
Remote  : Yes
Link    : https://security.archlinux.org/AVG-2113


The package istio before version 1.10.2-1 is vulnerable to information


Upgrade to 1.10.2-1.

# pacman -Syu "istio>=1.10.2-1"

The problem has been fixed upstream in version 1.10.2.


This vulnerability can be mitigated by disabling Istiod caching.
Caching is disabled by setting an Istiod environment variable
PILOT_ENABLE_XDS_CACHE=false. System and Istiod performance may be
impacted as this disables XDS caching.


Istio before version 1.10.2 contains a remotely exploitable
vulnerability where credentials specified in the Gateway and
DestinationRule credentialName field can be accessed from different

The Istio Gateway and DestinationRule can load private keys and
certificates from Kubernetes secrets via the credentialName
configuration. For Istio 1.8 and above, the secrets are conveyed from
Istiod to gateways or workloads via the XDS API.

In the above approach, a gateway or workload deployment should only be
able to access credentials (TLS certificates and private keys) stored
in the Kubernetes secrets within its namespace. However, a bug in
Istiod permits an authorized client the ability to access and retrieve
any TLS certificate and private key cached in Istiod.


An authorized client could retrieve any TLS certificate and private key
cached in Istiod outside of its own namespace.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20210703/100bc422/attachment-0001.sig>

More information about the arch-security mailing list