content/en/news/releases/1.1.x/announcing-1.1.13/index.md
We're pleased to announce the availability of Istio 1.1.13. Please see below for what's changed.
{{< relnote >}}
This release contains fixes for the security vulnerabilities described in ISTIO-SECURITY-2019-003 and ISTIO-SECURITY-2019-004. Specifically:
ISTIO-SECURITY-2019-003: An Envoy user reported publicly an issue (c.f. Envoy Issue 7728) about regular expressions matching that crashes Envoy with very large URIs.
JWT, VirtualService, HTTPAPISpecBinding, QuotaSpecBinding.ISTIO-SECURITY-2019-004: Envoy, and subsequently Istio are vulnerable to a series of trivial HTTP/2-based DoS attacks:
PING frames and queuing of response PING ACK frames that results in unbounded memory growth (which can lead to out of memory conditions).HEADERS frames with invalid HTTP headers and queuing of response RST_STREAM frames that results in unbounded memory growth (which can lead to out of memory conditions).SETTINGS frames and queuing of SETTINGS ACK frames that results in unbounded memory growth (which can lead to out of memory conditions).Nothing else is included in this release except for the above security fixes.