fix(deps): update module github.com/envoyproxy/gateway to v1.5.7 [security]#577
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
fix(deps): update module github.com/envoyproxy/gateway to v1.5.7 [security]#577renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
Contributor
Author
ℹ️ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
7b984a0 to
25a28e4
Compare
25a28e4 to
7ca79d4
Compare
7ca79d4 to
088cedf
Compare
380c4ff to
37d2664
Compare
37d2664 to
75c7572
Compare
75c7572 to
b357831
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.4.2→v1.5.7Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Envoy Extension Policy lua scripts injection causes arbitrary command execution
CVE-2026-22771 / GHSA-xrwg-mqj6-6m22
More information
Details
Impact
Envoy Gateway allows users to create Lua scripts that are executed by Envoy proxy using the
EnvoyExtensionPolicyresource. Administrators can use Kubernetes RBAC to grant users the ability to createEnvoyExtensionPolicyresources. Lua scripts in policies are executed in two contexts:EnvoyExtensionPolicycan be attached to Gateway and xRoute resources. Lua scripts in the policy will process traffic in that scope.Lua scripts executed by Envoy proxy can be used to leak the proxy's credentials. These credentials can then be used to communicate with the control plane and gain access to all secrets that are used by Envoy proxy, e.g. TLS private keys and credentials used for downstream and upstream communication.
For example, the following EnvoyExtensionPolicy, when executed by Envoy proxy, will leak the proxy's XDS client certificates.
This execution can lead to arbitrary code execution in the Envoy Gateway controller pod. Attackers can leverage this to achieve privilege escalation. For example, the following
EnvoyExtensionPolicywill read the Envoy Gateway K8s service account token and return it in an error which will be displayed in the resource status.Results in:
Attackers can then use this token to steal other secrets, run arbitrary pods in the envoy-gateway-system namespace and delete Envoy Gateway itself.
Patches
The patch sets secure defaults and addresses lack of guardrails allowing arbitrary Lua execution:
Strictvalidation by default in Envoy Gateway along with a security hardening module. This module blocks dangerous Lua code that may be executed in proxy and controller pods.SyntaxtoInsecureSyntaxvalidation mode to signify that in this validation mode Lua won't be validated for possible security gaps.disableLuaoption in EnvoyProxy that rejects EnvoyExtenstionPolicies with Lua scripts entirely, blocking the option to execute arbitrary Lua code.Workarounds
Envoy Gateway users can create Kubernetes RBAC rules (see docs) that apply on EnvoyExtensionPolicy resources to restrict creation of these Lua policies to trusted namespaces. Note that this restriction will apply to all EnvoyExtensionPolicies, regardless of the extensibility option that is used (Lua, Wasm or Ext-Proc).
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Release Notes
envoyproxy/gateway (github.com/envoyproxy/gateway)
v1.5.7Compare Source
Release Announcement
Check out the v1.5.7 release notes to learn more about the release.
v1.5.6Compare Source
Release Announcement
Check out the v1.5.6 release notes to learn more about the release.
v1.5.5Compare Source
Release Announcement
Check out the v1.5.5 release notes to learn more about the release.
v1.5.4Compare Source
Release Announcement
Check out the v1.5.4 release notes to learn more about the release.
v1.5.3Compare Source
Release Announcement
Check out the v1.5.3 release notes to learn more about the release.
v1.5.2Compare Source
Release Announcement
Check out the v1.5.2 release notes to learn more about the release.
v1.5.1Compare Source
Release Announcement
Check out the v1.5.1 release notes to learn more about the release.
v1.5.0Release Announcement
Check out the v1.5 release announcement to learn more about the release.
What's Changed
BackendTrafficPolicyfor GPRC timeouts by @Antvirf in #5822go.lint.fmttarget by @cnvergence in #5846d1fc914toecbab76in /tools/docker/envoy-gateway by @dependabot[bot] in #6115misc:errorby @zirain in #614937f7b37tof85340bin /tools/docker/envoy-gateway by @dependabot[bot] in #6246ecbab76tofa7b50fin /tools/docker/envoy-gateway by @dependabot[bot] in #6320imageandimageRepositoryby @sudiptob2 in #6354Configuration
📅 Schedule: (UTC)
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.