content/en/news/releases/1.11.x/announcing-1.11.7/index.md
This release fixes the security vulnerabilities described in our February 22nd post, ISTIO-SECURITY-2022-003. This release note describes what’s different between Istio 1.11.6 and 1.11.7.
{{< relnote >}}
At this time it is not believed that Istio is vulnerable to these CVEs in Envoy. They are listed, however, to be transparent.
CVE-2021-43824:
(CVSS Score 6.5, Medium): Potential null pointer dereference when using JWT filter safe_regex match.
CVE-2021-43825: (CVSS Score 6.1, Medium): Use-after-free when response filters increase response data, and increased data exceeds downstream buffer limits.
CVE-2021-43826: (CVSS Score 6.1, Medium): Use-after-free when tunneling TCP over HTTP, if downstream disconnects during upstream connection establishment.
CVE-2022-21654: (CVSS Score 7.3, High): Incorrect configuration handling allows mTLS session re-use without re-validation after validation settings have changed.
CVE-2022-21655: (CVSS Score 7.5, High): Incorrect handling of internal redirects to routes with a direct response entry.