All security bulletins for Anthos clusters on VMware (GKE on-prem) are described in this topic.
Vulnerabilities are often kept secret under embargos until affected parties have had a chance to address them. In these cases, Anthos clusters on VMware's Release notes will refer to "security updates" until the embargo has been lifted. At that point the notes will be updated to reflect the vulnerability the patch addressed.
To get the latest security bulletins delivered to you, add the URL of this page to your feed reader.
GCP-2020-015
Published: 2020-12-07Description | Severity | Notes |
---|---|---|
The Kubernetes project recently discovered a new security vulnerability, CVE-2020-8554, that might allow an attacker who has obtained permissions to create a Kubernetes Service of type LoadBalancer or ClusterIP to intercept network traffic originating from other Pods in the cluster. This vulnerability by itself does not give an attacker permissions to create a Kubernetes Service. All Anthos clusters on VMware are affected by this vulnerability. What should I do?Kubernetes might need to make backwards incompatible design changes in a future version to address the vulnerability. If many users share access to your cluster with permissions to create Services, such as in a multi-tenant cluster, consider applying a mitigation in the meantime. For now, the best approach for mitigation is to restrict the use of ExternalIPs in a cluster. ExternalIPs are not a commonly used feature. Restrict the use of ExternalIPs in a cluster with one of the following methods:
As mentioned in the
Kubernetes announcement,
no mitigation is provided for Services of type LoadBalancer because, by
default, only highly privileged users and system components are granted the
|
Medium |
GCP-2020-014
Published: 2020-10-20Updated: 2020-10-10
Description | Severity | Notes |
---|---|---|
The Kubernetes project recently discovered several issues that allow for the exposure of secret data when verbose logging options are enabled. The issues are:
GKE on-prem is not affected. What should I do?No further action is required due to the default verbosity logging levels of GKE. |
None |
GCP-2020-012
Published: 2020-09-14Updated: 2020-09-17
Description | Severity | Notes |
---|---|---|
A vulnerability was recently discovered in the Linux kernel, described in CVE-2020-14386, that may allow container escape to obtain root privileges on the host node. All Anthos clusters on VMware nodes are affected. What should I do?To fix this vulnerability, upgrade your cluster to a patched version. The following upcoming Anthos clusters on VMware versions will contain the fix for this vulnerability, and this bulletin will be updated when they are available:
Exploiting this vulnerability requires CAP_NET_RAW, but very few containers typically require CAP_NET_RAW . This and other powerful
capabilities should be blocked by default through PodSecurityPolicy or
Policy Controller:
Drop the
What vulnerability is addressed by this patch? The patch mitigates the following vulnerability: The vulnerability CVE-2020-14386, which allows containers with CAP_NET_RAW to write 1 to 10 bytes of kernel memory, and possibly escape the container and obtain root privileges on the host node. This is rated as a High severity vulnerability. |
High |
GCP-2020-011
Published: 2020-07-24Description | Severity | Notes |
---|---|---|
A networking vulnerability, CVE-2020-8558, was recently discovered in Kubernetes. Services sometimes communicate with other applications running inside the same Pod using the local loopback interface (127.0.0.1). This vulnerability allows an attacker with access to the cluster's network to send traffic to the loopback interface of adjacent Pods and nodes. Services that rely on the loopback interface not being accessible outside their Pod could be exploited. What should I do?To fix this vulnerability, upgrade your cluster to a patched version. The following Anthos clusters on VMware versions or newer contain the fix for this vulnerability:
What vulnerability is addressed by this patch?This patch fixes the following vulnerability: CVE-2020-8558. |
Medium |
GCP-2020-009
Published: 2020-07-15Description | Severity | Notes |
---|---|---|
A privilege escalation vulnerability, CVE-2020-8559, was recently discovered in Kubernetes. This vulnerability allows an attacker that has already compromised a node to execute a command in any Pod in the cluster. The attacker can thereby use the already compromised node to compromise other nodes and potentially read information, or cause destructive actions. Note that for an attacker to exploit this vulnerability, a node in your cluster must have already been compromised. This vulnerability, by itself, will not compromise any nodes in your cluster. What should I do?Upgrade your cluster to a patched version. The following upcoming Anthos clusters on VMware versions or newer contain the fix for this vulnerability:
What vulnerability is addressed by this patch?These patches mitigate vulnerability CVE-2020-8559. This is rated as a Medium vulnerability for GKE, as it requires the attacker to have first hand information about the cluster, nodes, and workloads to effectively leverage this attack in addition to an existing compromised node. This vulnerability by itself will not provide an attacker with a compromised node. |
Medium |
GCP-2020-007
Published: 2020-06-01Description | Severity | Notes |
---|---|---|
Server Side Request Forgery (SSRF) vulnerability,
CVE-2020-8555,
was recently discovered in Kubernetes, allowing certain authorized
users to leak up to 500 bytes of sensitive information from the
control plane host network. The Google Kubernetes Engine (GKE) control
plane uses controllers from Kubernetes and is thus affected by this
vulnerability. We recommend that you upgrade the control plane to the
latest patch version, as we detail below. A node upgrade is not required. What should I do?The following Anthos clusters on VMware (GKE on-prem) versions or newer contain the fix for this vulnerability:
If you are using a previous version, upgrade your existing cluster to a version containing the fix. What vulnerability is addressed by this patch?These patches mitigate vulnerability CVE-2020-8555. This is rated as a Medium vulnerability for GKE as it was difficult to exploit due to various control plane hardening measures. An attacker with permissions to create a Pod with certain
built-in Volume types (GlusterFS, Quobyte, StorageFS, ScaleIO) or
permissions to create a StorageClass can cause
Combined with a means to leak the results of the |
Medium |
GCP-2020-006
Published: 2020-06-01Description | Severity | Notes |
---|---|---|
Kubernetes has disclosed a vulnerability that allows a privileged container to redirect node traffic to another container. Mutual TLS/SSH traffic, such as between the kubelet and API server or traffic from applications using mTLS cannot be read or modified by this attack. All Google Kubernetes Engine (GKE) nodes are affected by this vulnerability, and we recommend that you upgrade to the latest patch version, as we detail below. What should I do?To mitigate this vulnerability for Anthos clusters on VMware (GKE on-prem), upgrade your clusters to the following version or newer:
Very few containers typically require
Drop the
What vulnerability is addressed by this patch?The patch mitigate the following vulnerability: The vulnerability described in
Kubernetes issue 91507
|
Medium |
GCP-2020-004
Description | Severity | Notes |
---|---|---|
A vulnerability was recently discovered in Kubernetes, described in CVE-2019-11254, which allows any user authorized to make POST requests to execute a remote Denial-of-Service attack on a Kubernetes API server. The Kubernetes Product Security Committee (PSC) released additional information on this vulnerability which can be found here. You can mitigate this vulnerability by limiting which clients have network access to your Kubernetes API servers. What should I do?We recommend that you upgrade your clusters to patch versions containing the fix for this vulnerability as soon as they are available. The patch versions which contain the fix are listed below:
What vulnerabilities are addressed by this patch?The patch fixes the following Denial-of-Service (DoS) vulnerability: |
Medium |
October 16, 2019
Description | Severity | Notes |
---|---|---|
A vulnerability was recently discovered in Kubernetes, described in CVE-2019-11253, which allows any user authorized to make POST requests to execute a remote Denial-of-Service attack on a Kubernetes API server. The Kubernetes Product Security Committee (PSC) released additional information on this vulnerability which can be found here. You can mitigate this vulnerability by limiting which clients have network access to your Kubernetes API servers. What should I do?We recommend that you upgrade your clusters to a patch version containing the fix as soon as they are available. The patch versions which will contain the fix are listed below:
What vulnerability is addressed by this patch?The patch mitigates the following vulnerability: CVE-2019-11253. |
High |
August 23, 2019
Description | Severity | Notes |
---|---|---|
We recently discovered and mitigated a vulnerability where the RBAC proxy used for securing monitoring endpoints did not correctly authorize users. As a result, metrics from certain components are available to unauthorized users from within the internal cluster network. The following components were affected:
What should I do?We recommend that you upgrade your clusters to version 1.0.2-gke.3, which includes the patch for this vulnerability, as soon as possible. |
Medium |
August 22, 2019
Description | Severity | Notes |
---|---|---|
Kubernetes recently discovered a vulnerability, CVE-2019-11247, which allows cluster-scoped custom resource instances to be acted on as if they were namespaced objects existing in all Namespaces. This means user and service accounts with only namespace-level RBAC permissions can interact with cluster-scoped custom resources. Exploiting this vulnerability requires the attacker to have privileges to access the resource in any namespace. What should I do?We recommend that you upgrade your clusters to version 1.0.2-gke.3, which includes the patch for this vulnerability, as soon as possible. What vulnerability is addressed by this patch?The patch mitigates the following vulnerability: CVE-2019-11247. |
Medium |