-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0533
  Security Bulletin: Security Vulnerabilities affect IBM Cloud Private -
        Kubernetes (CVE-2019-17110, CVE-2019-10223, CVE-2019-11253)
                             18 February 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Cloud Private
Publisher:         IBM
Operating System:  Linux variants
Impact/Access:     Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-17110 CVE-2019-11253 CVE-2019-10223

Reference:         ESB-2019.4368
                   ESB-2019.4198
                   ESB-2019.4004
                   ESB-2019.3900

Original Bulletin: 
   https://www.ibm.com/support/pages/node/2495349

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Vulnerabilities affect IBM Cloud Private - Kubernetes (CVE-2019-17110,
CVE-2019-10223, CVE-2019-11253)

Security Bulletin

Summary

Security Vulnerabilities affect IBM Cloud Private - Kubernetes

Vulnerability Details

CVEID: CVE-2019-17110
DESCRIPTION: A security issue was discovered in kube-state-metrics 1.7.x before
1.7.2. An experimental feature was added to v1.7.0 and v1.7.1 that enabled
annotations to be exposed as metrics. By default, kube-state-metrics metrics
only expose metadata about Secrets. However, a combination of the default
kubectl behavior and this new feature can cause the entire secret content to
end up in metric labels, thus inadvertently exposing the secret content in
metrics.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
168365 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2019-10223
DESCRIPTION: A security issue was discovered in the kube-state-metrics versions
v1.7.0 and v1.7.1. An experimental feature was added to the v1.7.0 release that
enabled annotations to be exposed as metrics. By default, the
kube-state-metrics metrics only expose metadata about Secrets. However, a
combination of the default `kubectl` behavior and this new feature can cause
the entire secret content to end up in metric labels thus inadvertently
exposing the secret content in metrics. This feature has been reverted and
released as the v1.7.2 release. If you are running the v1.7.0 or v1.7.1
release, please upgrade to the v1.7.2 release as soon as possible.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
165077 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2019-11253
DESCRIPTION: Improper input validation in the Kubernetes API server in versions
v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows
authorized users to send malicious YAML or JSON payloads, causing the API
server to consume excessive CPU or memory, potentially crashing and becoming
unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users
to submit requests that could trigger this vulnerability. Clusters upgraded
from a version prior to v1.14.0 keep the more permissive policy by default for
backwards compatibility.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
168618 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

+--------------------+----------+
|Affected Product(s) |Version(s)|
+--------------------+----------+
|IBM Cloud Private   |3.2.0 CD  |
+--------------------+----------+
|IBM Cloud Private   |3.2.1 CD  |
+--------------------+----------+

Remediation/Fixes

Product defect fixes and security updates are only available for the two most
recent Continuous Delivery (CD) update packages

  o IBM Cloud Private 3.2.0
  o IBM Cloud Private 3.2.1

For IBM Cloud Private 3.2.0, apply January Fixpack:

  o IBM Cloud Private 3.2.0.2001 fixpack

For IBM Cloud Private 3.2.1, apply January Fixpack:

  o IBM Cloud Private 3.2.1.2001 fixpack

For IBM Cloud Private 3.1.0, 3.1.1, 3.1.2:

  o Upgrade to the latest Continuous Delivery (CD) update package, IBM Cloud
    Private 3.2.1.
  o If required, individual product fixes can be made available between CD
    update packages for resolution of problems. Contact IBM support for
    assistance

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=70IC
-----END PGP SIGNATURE-----