Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.0533 Security Bulletin: Security Vulnerabilities affect IBM Cloud Private - Kubernetes (CVE-2019-17110, CVE-2019-10223, CVE-2019-11253) 18 February 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Cloud Private Publisher: IBM Operating System: Linux variants Impact/Access: Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-17110 CVE-2019-11253 CVE-2019-10223 Reference: ESB-2019.4368 ESB-2019.4198 ESB-2019.4004 ESB-2019.3900 Original Bulletin: https://www.ibm.com/support/pages/node/2495349 - --------------------------BEGIN INCLUDED TEXT-------------------- Security Vulnerabilities affect IBM Cloud Private - Kubernetes (CVE-2019-17110, CVE-2019-10223, CVE-2019-11253) Security Bulletin Summary Security Vulnerabilities affect IBM Cloud Private - Kubernetes Vulnerability Details CVEID: CVE-2019-17110 DESCRIPTION: A security issue was discovered in kube-state-metrics 1.7.x before 1.7.2. An experimental feature was added to v1.7.0 and v1.7.1 that enabled annotations to be exposed as metrics. By default, kube-state-metrics metrics only expose metadata about Secrets. However, a combination of the default kubectl behavior and this new feature can cause the entire secret content to end up in metric labels, thus inadvertently exposing the secret content in metrics. CVSS Base score: 7.5 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 168365 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) CVEID: CVE-2019-10223 DESCRIPTION: A security issue was discovered in the kube-state-metrics versions v1.7.0 and v1.7.1. An experimental feature was added to the v1.7.0 release that enabled annotations to be exposed as metrics. By default, the kube-state-metrics metrics only expose metadata about Secrets. However, a combination of the default `kubectl` behavior and this new feature can cause the entire secret content to end up in metric labels thus inadvertently exposing the secret content in metrics. This feature has been reverted and released as the v1.7.2 release. If you are running the v1.7.0 or v1.7.1 release, please upgrade to the v1.7.2 release as soon as possible. CVSS Base score: 5.9 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 165077 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) CVEID: CVE-2019-11253 DESCRIPTION: Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility. CVSS Base score: 7.5 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 168618 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Affected Products and Versions +--------------------+----------+ |Affected Product(s) |Version(s)| +--------------------+----------+ |IBM Cloud Private |3.2.0 CD | +--------------------+----------+ |IBM Cloud Private |3.2.1 CD | +--------------------+----------+ Remediation/Fixes Product defect fixes and security updates are only available for the two most recent Continuous Delivery (CD) update packages o IBM Cloud Private 3.2.0 o IBM Cloud Private 3.2.1 For IBM Cloud Private 3.2.0, apply January Fixpack: o IBM Cloud Private 3.2.0.2001 fixpack For IBM Cloud Private 3.2.1, apply January Fixpack: o IBM Cloud Private 3.2.1.2001 fixpack For IBM Cloud Private 3.1.0, 3.1.1, 3.1.2: o Upgrade to the latest Continuous Delivery (CD) update package, IBM Cloud Private 3.2.1. o If required, individual product fixes can be made available between CD update packages for resolution of problems. Contact IBM support for assistance Workarounds and Mitigations None Get Notified about Future Security Bulletins References - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXkslimaOgq3Tt24GAQiMeBAAh+ErFtn+DVci64rl5PGn9kZ9Kcf4hadb yhk4byx3ybVI/Ti+eMDlqvKuYZ93hG7j+DlU06qzYhj6xzkoi4BluQjeRW24my4S lvQUdp5IttlljDDG6CiM6V1+rhR68RdgaDQX2Rta61gD1Jz4v7vxRbYL68natdVy 0O6SD4NWITHhgeXfGz+bJfXeuCbY1AmMC45fqqy6ge4KfAUrs5bnx8lmnwSL5IB0 gZW3j8u5GKsR3LyV9ZHo2ysZcTJdOVE7gI8AsWWc14P1HeXnT+DeCfcOnel+HipX 9nJR2040ByIh1RnG79EdQWXoeYCI1Eq7mCcH2vOb4wUM/vwyxaI37O8ZatKaIKnv uziPkYANnbXJFU+Loa3MszGcU8pKYzzTubDLewG5qr03wys4461WJmFHJ++TmGP5 YXVb4lL+TcpxPiOK6cwcnDGH3IJZvKH/vuqf5kTaZkc4P4iksiVw1ALKnji7/LQT gtxtRctIF+mw+1fn69RlP34LMRnAapXRViiDxe7uj3DtzWN28tY748uKohvwbfzM PSL1mUz8gJVvMNCuJWDl5R4605KiNDW/i1kUxngw6dcz1SHa0DJLzv6hSD9NBdZe FH9fNtaDwThcxkH6HtQUW5wn6613BBsY+4ADwF2sIJ7YjUlZ6BMLwOwdt86uI+h9 hsVOqimofws= =70IC -----END PGP SIGNATURE-----