The following security bulletins are related to Google Cloud products.
Use this XML feed to subscribe to security bulletins for this page.
GCP-2023-046
Published: 2023-11-22
Description
Description | Severity | Notes |
---|---|---|
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes.
For instructions and more details, see the following bulletins: |
High | CVE-2023-5717 |
GCP-2023-045
Published: 2023-11-20
Description
Description | Severity | Notes |
---|---|---|
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes.
For instructions and more details, see the following bulletins: |
High | CVE-2023-5197 |
GCP-2023-044
Published: 2023-11-15
Description
Description | Severity | Notes |
---|---|---|
On November 14, AMD disclosed multiple vulnerabilities that impact various AMD server CPUs. Specifically, the vulnerabilities impact EPYC Server CPUs leveraging Zen core generation 2 "Rome," gen 3 "Milan," and gen 4 "Genoa." Google has applied fixes to affected assets, including Google Cloud, to ensure customers are protected. At this time, no evidence of exploitation has been found or reported to Google. What should I do? No customer action is required. Fixes have already been applied to the Google server fleet for Google Cloud, including Google Compute Engine. What vulnerabilities are being addressed? The patch mitigated the following vulnerabilities:
For more information, see AMD's security advisory AMD-SN-3005: "AMD INVD Instruction Security Notice", also published as CacheWarp, and AMD-SN-3002: "AMD Server Vulnerabilities – November 2023". |
Moderate |
GCP-2023-043
Published: 2023-11-14
Description
Description | Severity | Notes |
---|---|---|
Intel disclosed a CPU vulnerability in select processors. Google has taken steps to mitigate its server fleet, including Google Compute Engine for Google Cloud, and Chrome OS devices to ensure customers are protected. The vulnerability details:
What should I do? No customer action is required. The mitigation provided by Intel for the affected processors has been applied to the Google server fleet, including Google Compute Engine for Google Cloud. At this time, Google Distributed Cloud Edge requires an update from the OEM. Google will remediate this product once the update has been made available, and this bulletin will be updated accordingly. Chrome OS devices with the affected processors received the fix automatically as part of releases 119, 118, and 114 (LTS). What vulnerabilities are being addressed? CVE-2023-23583. For details, see Intel Security Advisory INTEL-SA-00950. |
High | CVE-2023-23583 |
GCP-2023-042
Published: 2023-11-13
Updated: 2023-11-15
Description
Description | Severity | Notes |
---|---|---|
2023-11-15 Update: Clarify that only the listed minor versions need to upgrade to a corresponding patched version for GKE. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes.
For instructions and more details, see the following bulletins: |
High | CVE-2023-4147 |
GCP-2023-041
Published: 2023-11-08
Updated: 2023-11-21
Description
Description | Severity | Notes |
---|---|---|
2023-11-21 Update: Clarify that only the listed minor versions need to upgrade to a corresponding patched version for GKE. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes.
For instructions and more details, see the following bulletins: |
High | CVE-2023-4004 |
GCP-2023-040
Published: 2023-11-06
Updated: 2023-11-21
Description
Description | Severity | Notes |
---|---|---|
2023-11-21 Update: Clarify that only the listed minor versions need to upgrade to a corresponding patched version for GKE. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes.
For instructions and more details, see the following bulletins: |
High | CVE-2023-4921 |
GCP-2023-039
Published: 2023-11-06
Updated: 2023-11-21, 2023-11-16
Description
Description | Severity | Notes |
---|---|---|
2023-11-21 Update: Clarify that only the listed minor versions need to upgrade to a corresponding patched version for GKE. 2023-11-16 Update: The vulnerability associated with this security bulletin is CVE-2023-4622. CVE-2023-4623 was incorrectly listed as the vulnerability in a previous version of the security bulletin. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes.
For instructions and more details, see the following bulletins: |
High | CVE-2023-4622 |
GCP-2023-038
Published: 2023-11-06
Updated: 2023-11-21
Description
Description | Severity | Notes |
---|---|---|
2023-11-21 Update: Clarify that only the listed minor versions need to upgrade to a corresponding patched version for GKE. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes.
For instructions and more details, see the following bulletins: |
High | CVE-2023-4623 |
GCP-2023-037
Published: 2023-11-06
Updated: 2023-11-21
Description
Description | Severity | Notes |
---|---|---|
2023-11-21 Update: Clarify that only the listed minor versions need to upgrade to a corresponding patched version for GKE. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes.
For instructions and more details, see the following bulletins: |
High | CVE-2023-4015 |
GCP-2023-036
Published: 2023-10-30
Description
Description | Severity | Notes |
---|---|---|
Deep Learning VM Images is a set of prepackaged virtual machine images with a deep learning framework that are ready to be run out of the box. Recently, an out-of-bounds write vulnerability was discovered in the `ReadHuffmanCodes()` function in the `libwebp` library. This might impact images that use this library. Google Cloud continuously scans its publicly published images and updates the packages to assure patched distros are included in the latest releases available for customer adoption. Deep Learning VM Images have been updated to ensure that the latest VM images include the patched distros. Customers adopting the latest VM images are not exposed to this vulnerability. What should I do? Google Cloud customers using published VM images should ensure that they are adopting the latest images and that their environments are up to date as per the shared responsibility model. CVE-2023-4863 could be exploited by an attacker to execute arbitrary code. This vulnerability was identified in Google Chrome prior to 116.0.5845.187 and in `libwebp` prior to 1.3.2 and is being listed under CVE-2023-4863. |
High | CVE-2023-4863 |
GCP-2023-035
Published: 2023-10-26
Updated: 2023-11-21
Description
Description | Severity | Notes |
---|---|---|
2023-11-21 Update: Clarify that only the listed minor versions need to upgrade to a corresponding patched version for GKE. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes.
For instructions and more details, see the following bulletins: |
High | CVE-2023-4206CVE-2023-4207, CVE-2023-4208, CVE-2023-4128 |
GCP-2023-034
Published: 2023-10-25
Updated: 2023-10-27
Description
Description | Severity | Notes |
---|---|---|
VMware disclosed multiple vulnerabilities in VMSA-2023-0023 that impact vCenter components deployed in customer environments. Cloud Customer Care impact
What should I do?No further action is required at this time |
Critical | CVE-2023-34048,CVE-2023-34056 |
GCP-2023-033
Published: 2023-10-24
Updated: 2023-11-21
Description
Description | Severity | Notes |
---|---|---|
2023-11-21 Update: Clarify that only the listed minor versions need to upgrade to a corresponding patched version for GKE. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes.
For instructions and more details, see the following bulletins: |
High | CVE-2023-3777 |
GCP-2023-032
Published: 2023-10-13
Updated: 2023-11-03
Description
Description | Severity | Notes |
---|---|---|
2023-11-03 Update: Added known issue for Apigee Edge for Private Cloud. A Denial-of-Service (DoS) vulnerability was recently discovered in multiple implementations of the HTTP/2 protocol (CVE-2023-44487), including the Apigee Ingress (Anthos Service Mesh) service used by Apigee X and Apigee Hybrid. The vulnerability could lead to a DoS of Apigee API management functionality. For instructions and more details see the Apigee security bulletin. |
High | CVE-2023-44487 |
GCP-2023-031
Published: 2023-10-10
Description
Description | Severity | Notes |
---|---|---|
A denial of service attack can affect the data plane when using the HTTP/2 protocol. For instructions and more details, see the Anthos Service Mesh security bulletin. |
High | CVE-2023-44487 |
GCP-2023-030
Published: 2023-10-10
Updated: 2023-11-09
Description
Description | Severity | Notes |
---|---|---|
2023-11-09 Update: Added CVE-2023-39325. Updated GKE versions with the latest patches for CVE-2023-44487 and CVE-2023-39325. A Denial-of-Service (DoS) vulnerability was recently discovered in multiple implementations of the HTTP/2 protocol (CVE-2023-44487), including the golang HTTP server used by Kubernetes. The vulnerability could lead to a DoS of the Google Kubernetes Engine (GKE) control plane. GKE clusters with authorized networks configured are protected by limiting network access, but all other clusters are affected. For instructions and more details, see the following bulletins: |
High | CVE-2023-44487, CVE-2023-39325 |
GCP-2023-029
Published: 2023-10-03
Description
Description | Severity | Notes |
---|---|---|
TorchServe is used to host PyTorch machine learning models for online prediction. Vertex AI provides prebuilt PyTorch model serving containers which depend on TorchServe. Vulnerabilities were recently discovered in TorchServe which would allow an attacker to take control of a TorchServe deployment if its model management API is exposed. Customers with PyTorch models deployed to Vertex AI online prediction are not affected by these vulnerabilities, since Vertex AI does not expose TorchServe's model management API. Customers using TorchServe outside of Vertex AI should take precautions to ensure their deployments are set up securely. What should I do? Vertex AI customers with deployed models using Vertex AI's prebuilt PyTorch serving containers do not need to take any action to address the vulnerabilities, since Vertex AI's deployments do not expose TorchServe's management server to the internet. Customers who are using the prebuilt PyTorch containers in other contexts, or who are using a custom-built or third-party distribution of TorchServe, should do the following:
What vulnerabilities are being addressed? TorchServe's management API is bound to CVE-2023-43654 and CVE-2022-1471 allow a user with access to the management API to load models from arbitrary sources and remotely execute code. Mitigations for both of these issues are included in TorchServe 0.8.2: the remote code execution path is removed, and a warning is emitted if the default value for |
High | CVE-2023-43654, CVE-2022-1471 |
GCP-2023-028
Published: 2023-09-19
Description
Description | Severity | Notes |
---|---|---|
Customers can configure Chronicle to ingest data from customer-owned Cloud Storage buckets using an ingestion feed. Until recently, Chronicle provided a shared service account that customers used to grant permission to the bucket. An opportunity existed such that one customer's Chronicle instance could be configured to ingest data from another customer's Cloud Storage bucket. After performing an impact analysis, we found no current or prior exploitation of this vulnerability. The vulnerability was present in all versions of Chronicle prior to Sept 19, 2023. What should I do? As of Sept 19, 2023, Chronicle has been updated to address this vulnerability. No customer action is required. What vulnerabilities are being addressed? Previously, Chronicle provided a shared service account that customers used to grant permission to a bucket. Because different customers gave the same Chronicle service account permission to their bucket, an exploitation vector existed that allowed one customer's feed to access a different customer's bucket when a feed was being created or modified. This exploitation vector required knowledge of the bucket URI. Now, during feed creation or modification, Chronicle uses unique service accounts for each customer. |
High |
GCP-2023-027
Published: 2023-09-11Description | Severity | Notes |
---|---|---|
VMware vCenter Server updates address multiple memory corruption vulnerabilities (CVE-2023-20892, CVE-2023-20893, CVE-2023-20894, CVE-2023-20895, CVE-2023-20896) Customer Care impactVMware vCenter Server (vCenter Server) and VMware Cloud Foundation (Cloud Foundation). What should I do?Customers are not impacted and no action needs to be taken. |
Medium |
GCP-2023-026
Published: 2023-09-06
Description
Description | Severity | Notes |
---|---|---|
Three vulnerabilities (CVE-2023-3676, CVE-2023-3955, CVE-2023-3893) have been discovered in Kubernetes where a user that can create Pods on Windows nodes may be able to escalate to admin privileges on those nodes. These vulnerabilities affect the Windows versions of Kubelet and the Kubernetes CSI proxy. For instructions and more details, see the following bulletins: |
High | CVE-2023-3676, CVE-2023-3955, CVE-2023-3893 |
GCP-2023-025
Published: 2023-08-08Description | Severity | Notes |
---|---|---|
Intel recently announced Intel Security Advisory INTEL-SA-00828 impacting some of their processor families. You are encouraged to assess your risks based on the advisory. Google Cloud VMware Engine impactOur fleet utilizes the impacted processor families. In our deployment, the entire server is dedicated to one customer. Hence, our deployment model doesn't add any additional risk to your assessment of this vulnerability. We are working with our partners to obtain necessary patches and will be deploying these patches on priority across the fleet using the standard upgrade process in the next several weeks. What should I do?No action is needed on your part, we are working on upgrading all the impacted systems. |
High |
GCP-2023-024
Published: 2023-08-08
Updated: 2023-08-10
Description
Description | Severity | Notes |
---|---|---|
2023-08-10 Update: Added ChromeOS LTS version number. Intel disclosed a vulnerability in select processors (CVE-2022-40982). Google has taken steps to mitigate its server fleet, including Google Cloud, to ensure customers are protected. The vulnerability details:
What should I do?
No customer action is required. All available patches have already been applied to the Google server fleet for Google Cloud, including Google Compute Engine. At this time, the following products require additional updates from partners and vendors.
Google will remediate these products once these patches have been made available, and this bulletin will be updated accordingly. Google Chromebook and ChromeOS Flex customers automatically received the Intel provided mitigations in Stable (115), LTS (108), Beta (116), and LTC (114). Chromebook and ChromeOS Flex customers pinned to an older release should consider unpinning and moving to Stable or LTS releases to ensure they receive this and other vulnerability fixes. What vulnerabilities are being addressed? CVE-2022-40982 - For more information, see Intel Security Advisory INTEL-SA-00828. |
High | CVE-2022-40982 |
GCP-2023-023
Published: 2023-08-08
Description
Description | Severity | Notes |
---|---|---|
AMD disclosed a vulnerability in select processors (CVE-2023-20569). Google has taken steps to mitigate its server fleet, including Google Cloud, to ensure customers are protected. The vulnerability details:
What should I do?
Users of Compute Engine VMs should consider OS provided mitigations if using intra-instance untrusted code execution. We recommend customers to contact their OS vendors for more specific guidance. Fixes have already been applied to the Google server fleet for Google Cloud, including Google Compute Engine. What vulnerabilities are being addressed? CVE-2023-20569 - For more information, see AMD SB-7005. |
Moderate | CVE-2023-20569 |
GCP-2023-022
Published: 2023-08-03
Description
Description | Severity | Notes |
---|---|---|
Google identified a vulnerability in gRPC C++ Implementations prior to the 1.57 release. This was a Denial-of-Service vulnerability within the gRPC's C++ implementation. These have been fixed in the 1.53.2, 1.54.3, 1.55.2, 1.56.2, and 1.57 releases. What should I do? Ensure that you're using the latest versions of the following software packages:
What vulnerabilities are being addressed? These patches mitigate the following vulnerabilities:
| High | CVE-2023-33953 |
GCP-2023-021
Updated:2023-07-26
Published:2023-07-25
Description
Description | Severity | Notes |
---|---|---|
The following CVEs expose Anthos Service Mesh to exploitable vulnerabilities:
For instructions and more details, see the Anthos Service Mesh security bulletin. |
High |
GCP-2023-020
Updated:2023-07-26
Published: 2023-07-24
Description
Description | Severity | Notes |
---|---|---|
AMD has released a microcode update that addresses a hardware security vulnerability (CVE-2023-20593). Google has applied the necessary fixes for this vulnerability to its server fleet, including servers for the Google Cloud Platform. Testing indicates there is no impact to the performance of systems. What should I do? No customer action is required, as fixes have already been applied to the Google server fleet for Google Cloud Platform. What vulnerabilities are being addressed? CVE-2023-20593 addresses a vulnerability in some AMD CPUs. More information can be found here. | High | CVE-2023-20593 |
GCP-2023-019
Published:2023-07-18
Description
Description | Severity | Notes |
---|---|---|
A new vulnerability (CVE-2023-35945) has been discovered in Envoy
where a specifically crafted response from an untrusted upstream service
can cause a denial of service through memory exhaustion. This is caused
by Envoy's HTTP/2 codec which may leak a header map and bookkeeping
structures upon receiving For instructions and more details, see the Anthos Service Mesh security bulletin. | High | CVE-2023-35945 |
GCP-2023-018
Published: 2023-06-27
Description
Description | Severity | Notes |
---|---|---|
A new vulnerability (CVE-2023-2235) has been discovered in the Linux kernel that can lead to a privilege escalation on the node. GKE Autopilot clusters are affected as GKE Autopilot nodes always use Container-Optimized OS node images. GKE Standard clusters with versions 1.25 or later that are running Container-Optimized OS node images are affected. GKE clusters are not affected if they are running only Ubuntu node images, or running versions before 1.25, or using GKE Sandbox. For instructions and more details, see the following bulletins: |
High | CVE-2023-2235 |
GCP-2023-017
Published: 2023-06-26
Updated: 2023-07-11
Description
Description | Severity | Notes |
---|---|---|
2023-07-11 Update: New GKE versions have been updated to include the latest Ubuntu versions that patch CVE-2023-31436. A new vulnerability (CVE-2023-31436) has been discovered in the Linux kernel that can lead to a privilege escalation on the node. GKE clusters, including Autopilot clusters, are affected. GKE clusters using GKE Sandbox are not affected. For instructions and more details, see the following bulletins: |
High | CVE-2023-31436 |
GCP-2023-016
Published: 2023-06-26
Description
Description | Severity | Notes |
---|---|---|
A number of vulnerabilities have been discovered in Envoy, which is used in Anthos Service Mesh that allow a malicious attacker to cause a denial of service or crash Envoy. These were reported separately as GCP-2023-002. For instructions and more details, see the following bulletins: |
High | CVE-2023-27496, CVE-2023-27488, CVE-2023-27493, CVE-2023-27492, CVE-2023-27491, CVE-2023-27487 |
GCP-2023-015
Published: 2023-06-20
Description
Description | Severity | Notes |
---|---|---|
A new vulnerability, CVE-2023-0468, has been discovered in the Linux kernel that could allow an unprivileged user to escalate privileges to root when io_poll_get_ownership will keep increasing req->poll_refs on every io_poll_wake then overflow to 0 which will fput req->file twice and cause a struct file refcount issue. GKE clusters, including Autopilot clusters, with Container-Optimized OS using Linux Kernel version 5.15 are affected. GKE clusters using Ubuntu images or using GKE Sandbox are unaffected. For instructions and more details, see the following bulletins: |
Medium | CVE-CVE-2023-0468 |
GCP-2023-014
Updated: 2023-08-11
Published: 2023-06-15
Description
Description | Severity | Notes |
---|---|---|
2023-08-11 Update: Added patch versions for GKE on VMware, GKE on AWS, GKE on Azure, and Google Distributed Cloud Virtual for Bare Metal. Two new security issues were discovered in Kubernetes where users may be able to launch containers that bypass policy restrictions when using ephemeral containers and either ImagePolicyWebhook (CVE-2023-2727) or the ServiceAccount admission plugin (CVE-2023-2728). For instructions and more details, see the following bulletins: |
Medium | CVE-2023-2727, CVE-2023-2728 |
GCP-2023-013
Published: 2023-06-08
Description
Description | Severity | Notes |
---|---|---|
When you enable the Cloud Build API in a project,
Cloud Build automatically creates a default service account
to execute builds on your behalf. This Cloud Build service
account previously had the For instructions and more details, see the Cloud Build security bulletin. |
Low |
GCP-2023-010
Published: 2023-06-07
Description
Description | Severity | Notes |
---|---|---|
Google identified three new vulnerabilities in the gRPC C ++ implementation. These will be published soon publicly as CVE-2023-1428, CVE-2023-32731 and CVE-2023-32732. In April, we identified two vulnerabilities in 1.53 and 1.54 releases. One was a Denial-of-Service vulnerability within the gRPC's C++ implementation and the other was a remote data exfiltration vulnerability. These have been fixed in 1.53.1, 1.54.2 and later releases. Previously in March, our internal teams discovered a Denial-of-Service vulnerability within the gRPC's C++ implementation while performing routine fuzzing activities. It was found in the gRPC 1.52 release, and has been fixed in the 1.52.2 and 1.53 releases. What should I do?Ensure that you're using the latest versions of the following software packages:
What vulnerabilities are addressed by these patches?These patches mitigate the following vulnerabilities:
We recommend upgrading to the latest versions of the following software packages as listed above. |
High (CVE-2023-1428, CVE-2023-32731). Medium (CVE-2023-32732) | CVE-2023-1428, CVE-2023-32731, CVE-023-32732 |
GCP-2023-009
Published: 2023-06-06
Description
Description | Severity | Notes |
---|---|---|
A new vulnerability (CVE-2023-2878) has been discovered in the secrets-store-csi-driver where an actor with access to the driver logs could observe service account tokens. For instructions and more details, see the following bulletins: |
None | CVE-2023-2878 |
GCP-2023-008
Published: 2023-06-05
Description
Description | Severity | Notes |
---|---|---|
A new vulnerability (CVE-2023-1872) has been discovered in the Linux kernel that can lead to a privilege escalation to root on the node. For instructions and more details, see the following bulletins: |
High | CVE-2023-1872 |
GCP-2023-007
Published: 2023-06-02
Description
Description | Severity | Notes |
---|---|---|
A vulnerability was recently discovered in Cloud SQL for SQL Server that
allowed customer administrator accounts to create triggers in the
Google Cloud resolved the issue by patching the security vulnerability by March 1, 2023. Google Cloud didn't find any compromised customer instances. For instructions and more details, see the Cloud SQL security bulletin. |
High |
GCP-2023-005
Published: 2023-05-18
Updated: 2023-06-06
Description
Description | Severity | Notes |
---|---|---|
2023-06-06 Update: New GKE versions have been updated to include the latest Ubuntu versions that patch CVE-2023-1281 and CVE-2023-1829. Two new vulnerabilities (CVE-2023-1281, CVE-2023-1829) have been discovered in the Linux kernel that can lead to a privilege escalation to root on the node. For instructions and more details, see the following bulletins: |
High | CVE-2023-1281 CVE-2023-1829 |
GCP-2023-004
Published: 2023-04-26
Description
Description | Severity | Notes |
---|---|---|
Two vulnerabilities (CVE-2023-1017 and CVE-2023-1018) were discovered in Trusted Platform Module (TPM) 2.0. The vulnerabilities could have allowed a sophisticated attacker to exploit a 2-byte out of bounds read/write on certain Compute Engine VMs. For instructions and more details, see the Compute Engine security bulletin. |
Medium |
GCP-2023-003
Published: 2023-04-11
Description
Description | Severity | Notes |
---|---|---|
Two new vulnerabilities, CVE-2023-0240 and CVE-2023-23586, have been discovered in the Linux kernel that could allow an unprivileged user to escalate privileges. For instructions and more details, see the following bulletins: |
High | CVE-2023-0240, CVE-2023-23586 |
GCP-2023-002
Description
Description | Severity | Notes |
---|---|---|
The following CVEs expose Anthos Service Mesh to exploitable vulnerabilities:
For instructions and more details, see the Anthos Service Mesh security bulletin.: |
High |
GCP-2023-001
Published: 2023-03-01
Description
Description | Severity | Notes |
---|---|---|
A new vulnerability (CVE-2022-4696) has been discovered in the Linux kernel that can lead to a privilege escalation on the node. For instructions and more details, see the following bulletins: |
High | CVE-2022-4696 |
GCP-2022-026
Published: 2023-01-11
Description
Description | Severity | Notes |
---|---|---|
Two new vulnerabilities (CVE-2022-3786 and CVE-2022-3602) have been discovered in OpenSSL v3.0.6 that can potentially cause a crash. For instructions and more details, see the following bulletins: |
Medium |
GCP-2022-025
Published: 2022-12-21 Updated: 2023-01-19
Description
Description | Severity | Notes |
---|---|---|
2023-01-19 Update: Added information that GKE version 1.21.14-gke.14100 is available. Two new vulnerabilities (CVE-2022-3786 and CVE-2022-3602) have been discovered in OpenSSL v3.0.6 that can potentially cause a crash. For instructions and more details, see the following bulletins: |
Medium |
GCP-2022-024
Published: 2022-11-09
Updated: 2023-01-19
Description
Description | Severity | Notes |
---|---|---|
2023-01-19 Update: Added information that GKE version 1.21.14-gke.14100 is available. 2022-12-16 Update: Added patch versions for GKE and GKE on VMware. Two new vulnerabilities (CVE-2022-2585 and CVE-2022-2588) have been discovered in the Linux kernel that can lead to a full container break out to root on the node. For instructions and more details, see the: |
High |
GCP-2022-023
Published: 2022-11-04
Description
Description | Severity | Notes |
---|---|---|
A security vulnerability, CVE-2022-39278, has been discovered in Istio, which is used in Anthos Service Mesh, that allows a malicious attacker to crash the control plane. For instructions and more details, see the following bulletins: |
High | CVE-2022-39278 |
GCP-2022-022
Published: 2022-10-28
Updated: 2022-12-14
Description
Description | Severity | Notes |
---|---|---|
2022-12-14 Update: Added patch versions for GKE and GKE on VMware. A new vulnerability, CVE-2022-20409, has been discovered in the Linux kernel that could allow an unprivileged user to escalate to system execution privilege. For instructions and more details, see the following bulletins: |
High | CVE-2022-20409 |
GCP-2022-021
Published: 2022-10-27
Updated: 2023-01-19
Description
Description | Severity | Notes |
---|---|---|
2023-01-19 Update: Added information that GKE version 1.21.14-gke.14100 is available. 2022-12-15 Update: Updated information that version 1.21.14-gke.9400 of Google Kubernetes Engine is pending rollout and may be superseded by a higher version number. 2022-11-22 Update: Added patch versions for GKE on VMware, GKE on AWS, and GKE on Azure. A new vulnerability, CVE-2022-3176, has been discovered in the Linux kernel that can lead to local privilege escalation. This vulnerability allows an unprivileged user to achieve full container breakout to root on the node. For instructions and more details, see the following bulletins: |
High | CVE-2022-3176 |
GCP-2022-020
Published: 2022-10-05
Updated: 2022-10-12
Description
Description | Severity | Notes |
---|---|---|
The Istio control plane For instructions and more details, see the Anthos Service Mesh security bulletin. |
High | CVE-2022-39278 |
GCP-2022-019
Published: 2022-09-22
Description
Description | Severity | Notes |
---|---|---|
A message parsing and memory management vulnerability in ProtocolBuffer’s C++ and Python implementations can trigger an out of memory (OOM) failure when processing a specially crafted message. This could lead to a denial of service (DoS) on services using the libraries. What should I do?Ensure that you're using the latest versions of the following software packages:
What vulnerabilities are addressed by this patch?The patch mitigates the following vulnerability:
A specially constructed small message that causes the running service
to allocate large amounts of RAM. The small size of the request means
that it is easy to take advantage of the vulnerability and exhaust
resources. C++ and Python systems that consume untrusted protobufs
would be vulnerable to DoS attacks if they contain a
|
Medium | CVE-2022-1941 |
GCP-2022-018
Published: 2022-08-01
Updated: 2022-09-14
Description
Description | Severity | Notes |
---|---|---|
2022-09-14 Update: Added patch versions for GKE on VMware, GKE on AWS, and GKE on Azure. A new vulnerability (CVE-2022-2327) has been discovered in the Linux kernel that can lead to local privilege escalation. This vulnerability allows an unprivileged user to achieve a full container breakout to root on the node. For instructions and more details, see the following bulletins: | High | CVE-2022-2327 |
GCP-2022-017
Published: 2022-06-29
Updated: 2022-11-22
Description
Description | Severity | Notes |
---|---|---|
2022-11-22 Update: Workloads using GKE Sandbox are not affected by these vulnerabilities. 2022-07-21 Update: additional information on GKE on VMware. A new vulnerability (CVE-2022-1786) has been discovered in the Linux kernel versions 5.10 and 5.11. This vulnerability allows an unprivileged user with local access to the cluster to achieve a full container breakout to root on the node. Only clusters that run Container-Optimized OS are affected. GKE Ubuntu versions use either version 5.4 or 5.15 of the kernel and are not affected. For instructions and more details, see the: |
High | CVE-2022-1786 |
GCP-2022-016
Published: 2022-06-23
Updated: 2022-11-22
Description
Description | Severity | Notes |
---|---|---|
2022-11-22 Update: Autopilot clusters are not affected by by CVE-2022-29581 but are vulnerable to CVE-2022-29582 and CVE-2022-1116. Three new memory corruption vulnerabilities (CVE-2022-29581, CVE-2022-29582, CVE-2022-1116) have been discovered in the Linux kernel. These vulnerabilities allow an unprivileged user with local access to the cluster to achieve a full container breakout to root on the node. All Linux clusters (Container-Optimized OS and Ubuntu) are affected. For instructions and more details, refer to the following bulletins: |
High |
GCP-2022-015
Published: 2022-06-09
Updated: 2022-06-10
Description
Description | Severity | Notes |
---|---|---|
2022-06-10 Update: The Anthos Service Mesh versions have been updated. For instructions and more details, see the Anthos Service Mesh security bulletin. The following Envoy and Istio CVEs expose Anthos Service Mesh and Istio on GKE to remotely exploitable vulnerabilities:
For instructions and more details, see the Anthos Service Mesh security bulletin. |
Critical |
GCP-2022-014
Published: 2022-04-26
Updated: 2022-11-22
Description
Description | Severity | Notes |
---|---|---|
2022-11-22 Update: GKE Autopilot clusters and workloads running in GKE Sandbox are unaffected. 2022-05-12 Update: The GKE on AWS and GKE on Azure versions have been updated. For instructions and more details, see the: Two security vulnerabilities, CVE-2022-1055 and CVE-2022-27666 have been discovered in the Linux kernel. Each can lead to a local attacker being able to perform a container breakout, privilege escalation on the host, or both. These vulnerabilities affect all GKE node operating systems (Container-Optimized OS and Ubuntu). For instructions and more details, see the following security bulletins: |
High |
CVE-2022-1055 CVE-2022-27666 |
GCP-2022-013
Published: 2022-04-11
Updated: 2022-04-22
Description
Description | Severity | Notes |
---|---|---|
A security vulnerability, CVE-2022-23648, has been discovered in containerd's handling of path traversal in the OCI image volume specification. Containers launched through containerd's CRI implementation with a specially-crafted image configuration could gain full read access to arbitrary files and directories on the host. This vulnerability may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy). For instructions and more details, see the following security bulletins: |
Medium | CVE-2022-23648 |
GCP-2022-012
Published: 2022-04-07
Updated: 2022-11-22
Description
Description | Severity | Notes |
---|---|---|
2022-11-22 Update: For GKE clusters in both modes, Standard and Autopilot, workloads using GKE Sandbox are unaffected. A security vulnerability, CVE-2022-0847, has been discovered in the Linux kernel version 5.8 and later that can potentially escalate container privileges to root. This vulnerability affects the following products:
For instructions and more details, see the following security bulletins: |
High | CVE-2022-0847 |
GCP-2022-011
Published: 2022-03-22
Updated: 2022-08-11
Description
Description | Severity |
---|---|
Update 2022-08-11: Added more information about the Simultaneous Multi-Threading (SMT) configuration. SMT was intended to be disabled, but was enabled on the versions listed. If you manually enabled SMT for a sandboxed node pool, SMT will remain manually enabled despite this issue. There is a misconfiguration with Simultaneous Multi-Threading (SMT), also known as Hyper-threading, on GKE Sandbox images. The misconfiguration leaves nodes potentially exposed to side channel attacks such as Microarchitectural Data Sampling (MDS) (for more context, see GKE Sandbox documentation). We do not recommend using the following affected versions:
For instructions and more details, see the: GKE security bulletin. |
Medium |
GCP-2022-010
Description
Description | Severity | Notes |
---|---|---|
The following Istio CVE exposes Anthos Service Mesh to a remotely exploitable vulnerability:
For instructions and more details, see the following security bulletin: |
High |
GCP-2022-009
Published: 2022-03-01Description
Description | Severity |
---|---|
Some unexpected paths to access the node VM on GKE Autopilot clusters could have been used to escalate privileges in the cluster. These issues have been fixed and no further action is required. The fixes address issues reported through our Vulnerability Reward Program. For instructions and more details, see the GKE security bulletin |
Low |
GCP-2022-008
Published: 2022-02-23
Updated: 2022-04-28
Description
Description | Severity | Notes |
---|---|---|
2022-04-28 Update: Added versions of GKE on VMware that fix these vulnerabilities. For details, see the GKE on VMware security bulletin. The Envoy project recently discovered a set of vulnerabilities. All issues listed below are fixed in Envoy release 1.21.1.
What should I do? Envoy users managing their own Envoys should ensure that they are using Envoy release 1.21.1. Envoy users managing their own Envoys build the binaries from a source like GitHub and deploy them. There's no action to be taken by users who run managed Envoys (Google Cloud provides the Envoy binaries), for which Google Cloud products will switch to 1.21.1. |
High |
CVE-2022-23606 CVE-2022-21655 CVE-2021-43826 CVE-2021-43825 CVE-2021-43824 CVE-2022-21654 CVE-2022-21657 CVE-2022-21656 |
GCP-2022-007
Published: 2022-02-22Description
Description | Severity | Notes |
---|---|---|
The following Envoy and Istio CVEs expose Anthos Service Mesh and Istio on GKE to remotely exploitable vulnerabilities:
For instructions and more details, see the following security bulletins: |
High |
GCP-2022-006
Published: 2022-02-14Updated: 2022-05-16
Description
Description | Severity | Notes |
---|---|---|
2022-05-16 Update: Added GKE version 1.19.16-gke.7800 or later to the list of versions that have code to fix this vulnerability. For details, see the GKE security bulletin. 2022-05-12 Update: The GKE, GKE on VMware, GKE on AWS, and GKE on Azure versions have been updated. For instructions and more details, see the:
A security vulnerability, CVE-2022-0492,
has been discovered in the Linux kernel's |
Low |
For instructions and more details, see the: |
GCP-2022-005
Published: 2022-02-11Updated: 2022-02-15
Description
Description | Severity | Notes |
---|---|---|
A security vulnerability, CVE-2021-43527, has been discovered in any binary that links to the vulnerable versions of libnss3 found in NSS (Network Security Services) versions prior to 3.73 or 3.68.1. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how NSS is used/configured. For instructions and more details, see the: |
Medium | CVE-2021-43527 |
GCP-2022-004
Published: 2022-02-04Description
Description | Severity | Notes |
---|---|---|
A security vulnerability, CVE-2021-4034, has been discovered in pkexec, a part of the Linux policy kit package (polkit), that allows an authenticated user to perform a privilege escalation attack. PolicyKit is generally used only on Linux desktop systems to allow non-root users to perform actions such as rebooting the system, installing packages, restarting services etc, as governed by a policy. For instructions and more details, see the: |
None | CVE-2021-4034 |
GCP-2022-002
Published: 2022-02-01Updated: 2022-02-25
Description
Description | Severity | Notes |
---|---|---|
2022-02-25 Update: The GKE versions have been updated. For instructions and more details, see the: 2022-02-23 Update: The GKE and GKE on VMware versions have been updated. For instructions and more details, see the: 2022-02-04 Update: The rollout start date for GKE patch versions was February 2. Three security vulnerabilities, CVE-2021-4154, CVE-2021-22600, and CVE-2022-0185, have been discovered in the Linux kernel, each of which can lead to either a container breakout, privilege escalation on the host, or both. These vulnerabilities affect all node operating systems (COS and Ubuntu) on GKE, GKE on VMware, GKE on AWS (current and previous generation), and GKE on Azure. Pods using GKE Sandbox are not vulnerable to these vulnerabilities. See the COS release notes for more details. For instructions and more details, see the: |
High |
GCP-2022-001
Published: 2022-01-06Description
Description | Severity | Notes |
---|---|---|
A potential Denial of Service issue in What should I do? Ensure that you're using the latest versions of the following software packages:
Protobuf "javalite" users (typically Android) are not affected. What vulnerabilities are addressed by this patch? The patch mitigates the following vulnerability: An implementation weakness in how unknown fields are parsed in Java. A small (~800 KB) malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated garbage collection pauses. |
High | CVE-2021-22569 |
GCP-2021-024
Published: 2021-10-21Description
Description | Severity | Notes |
---|---|---|
A security issue was discovered in the Kubernetes ingress-nginx controller, CVE-2021-25742. Ingress-nginx custom snippets allows retrieval of ingress-nginx service account tokens and secrets across all namespaces. For instructions and more details, see the: | None | CVE-2021-25742 |
GCP-2021-019
Published: 2021-09-29Description
Description | Severity | Notes |
---|---|---|
There is a known issue where updating a For instructions and more details, see the GKE security bulletin. |
Low |
GCP-2021-022
Published: 2021-09-22Description
Description | Severity | Notes |
---|---|---|
A vulnerability has been discovered in the GKE Enterprise Identity Service (AIS) LDAP module of GKE on VMware versions 1.8 and 1.8.1 where a seed key used in generating keys is predictable. With this vulnerability, an authenticated user could add arbitrary claims and escalate privileges indefinitely. For instructions and more details, see the GKE on VMware security bulletin. |
High |
GCP-2021-021
Published: 2021-09-22Description
Description | Severity | Notes |
---|---|---|
A security vulnerability, CVE-2020-8561, has been discovered in Kubernetes where certain webhooks can be made to redirect kube-apiserver requests to private networks of that API server. For instructions and more details, see the: |
Medium | CVE-2020-8561 |
GCP-2021-023
Published: 2021-09-21Description
Description | Severity | Notes |
---|---|---|
Per VMware security advisory VMSA-2021-0020, VMware received reports of multiple vulnerabilities in vCenter. VMware has made updates available to remediate these vulnerabilities in affected VMware products. We have already applied the patches provided by VMware for the vSphere stack to Google Cloud VMware Engine per the VMware security advisory. This update addresses the security vulnerabilities described in CVE-2021-22005, CVE-2021-22006, CVE-2021-22007, CVE-2021-22008, and CVE-2021-22010. Other non-critical security issues will be addressed in the upcoming VMware stack upgrade (per the advance notice sent in July, more details will be provided soon on the specific timeline of the upgrade). VMware Engine impactBased on our investigations, no customers were found to be impacted. What should I do?Because VMware Engine clusters are not affected by this vulnerability, no further action is required. |
Critical |
GCP-2021-020
Published: 2021-09-17Description
Description | Severity | Notes |
---|---|---|
Certain Google Cloud load balancers routing to an Identity-Aware Proxy (IAP) enabled Backend Service could have been vulnerable to an untrusted party under limited conditions. This addresses an issue reported through our Vulnerability Reward Program. The conditions were that the servers:
In addition, a user in your organization must have clicked a specifically-crafted link sent by an untrusted party. This issue has now been resolved. IAP has been updated to issue cookies only to authorized hosts as of September 17, 2021. A host is considered authorized if it matches at least one Subject Alternative Name (SAN) in one of the certificates installed on your load balancers. What to do
Some of your users may experience an HTTP 401 Unauthorized response with an IAP error code 52 while trying to access apps or services. This error code means that the client sent a |
High |
GCP-2021-018
Published: 2021-09-15Updated: 2021-09-20
Description
Description | Severity | Notes |
---|---|---|
A security issue was discovered in Kubernetes, CVE-2021-25741, where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem. For instructions and more details, see the: |
High | CVE-2021-25741 |
GCP-2021-017
Published: 2021-09-01Updated: 2021-09-23
Description
Description | Severity | Notes |
---|---|---|
2021-09-23 update: Containers running inside of GKE Sandbox are unaffected by this vulnerability for attacks originating inside the container. Two security vulnerabilities, CVE-2021-33909 and CVE-2021-33910, have been discovered in the Linux kernel that can lead to an OS crash or an escalation to root by an unprivileged user. This vulnerability affects all GKE node operating systems (COS and Ubuntu). For instructions and more details, see the following security bulletins: |
High | CVE-2021-33909, CVE-2021-33910 |
GCP-2021-016
Published: 2021-08-24Description
Description | Severity | Notes |
---|---|---|
The following Envoy and Istio CVEs expose Anthos Service Mesh and Istio on GKE to remotely exploitable vulnerabilities:
For instructions and more details, see the following security bulletins: |
High |
GCP-2021-015
Published: 2021-07-13Updated: 2021-07-15
Description
Description | Severity | Notes |
---|---|---|
A new security vulnerability, CVE-2021-22555,
has been discovered where a malicious actor with For instructions and more details, see the following security bulletins: |
High | CVE-2021-22555 |
GCP-2021-014
Published: 2021-07-05Description
Description | Severity | Notes |
---|---|---|
Microsoft published a security bulletin on a Remote code execution (RCE) vulnerability, CVE-2021-34527, that affects the print spooler in Windows servers. The CERT Coordination Center (CERT/CC) published an update note on a related vulnerability, dubbed "PrintNightmare" that also affects Windows print spoolers - PrintNightmare, Critical Windows Print Spooler Vulnerability For instructions and more details, see the GKE security bulletin. |
High | CVE-2021-34527 |
GCP-2021-012
Published: 2021-06-24Updated: 2021-07-09
Description
Description | Severity | Notes |
---|---|---|
The Istio project recently announced a security vulnerability where credentials specified in the Gateway and DestinationRule credentialName field can be accessed from different namespaces. For product-specific instructions and more details, see:
|
High | CVE-2021-34824 |
GCP-2021-011
Published: 2021-06-04Updated: 2021-10-19
Description
Description | Severity | Notes |
---|---|---|
2021-10-19 update: For instructions and more details, see the following security bulletins:
The security community recently disclosed a new security vulnerability
(CVE-2021-30465)
found in For GKE, because exploiting this vulnerability requires the ability to create pods, we have rated the severity of this vulnerability at MEDIUM. For instructions and more details, see the GKE security bulletin. |
Medium | CVE-2021-30465 |
GCP-2021-010
Published: 2021-05-25Description
Description | Severity | Notes |
---|---|---|
Per VMware security advisory VMSA-2021-0010, remote code execution and authentication bypass vulnerabilities in vSphere Client (HTML5) were privately reported to VMware. VMware has made updates available to remediate these vulnerabilities in affected VMware products. We have applied the patches provided by VMware for the vSphere stack per the VMware security advisory. This update addresses security vulnerabilities described in CVE-2021-21985 and CVE-2021-21986. The image versions running in your VMware Engine private cloud do not reflect any change at this time to indicate the patches applied. Please rest assured that appropriate patches have been installed and your environment is secured from these vulnerabilities. VMware Engine impactBased on our investigations, no customers were found to be impacted. What should I do?Because VMware Engine clusters are not affected by this vulnerability, no further action is required. |
Critical |
GCP-2021-008
Published: 2021-05-17Description
Description | Severity | Notes |
---|---|---|
Istio contains a remotely exploitable vulnerability where an external
client can access unexpected services in the cluster, bypassing
authorization checks, when a gateway is configured with
For instructions and more details, see the Anthos Service Mesh security bulletin. |
High |
CVE-2021-31921 |
GCP-2021-007
Published: 2021-05-17Description
Description | Severity | Notes |
---|---|---|
Istio contains a remotely exploitable vulnerability where an HTTP request
path with multiple slashes or escaped slash characters ( For instructions and more details, see the Anthos Service Mesh security bulletin. |
High |
CVE-2021-31920 |
GCP-2021-006
Published: 2021-05-11Description
Description | Severity | Notes |
---|---|---|
The Istio project recently disclosed a new security vulnerability (CVE-2021-31920) affecting Istio. Istio contains a remotely-exploitable vulnerability where an HTTP request with multiple slashes or escaped slash characters can bypass Istio authorization policy when path based authorization rules are used. For instructions and more details, see the: |
High |
CVE-2021-31920 |
GCP-2021-005
Published: 2021-05-11Description
Description | Severity | Notes |
---|---|---|
A reported vulnerability has shown that Envoy does not decode escaped
slash sequences What should I do?
If backend servers treat What behavioral changes were introduced?Envoy's normalize_path and merge adjacent slashes options were enabled to address other common path confusion vulnerabilities in Envoy-based products. |
High |
CVE-2021-29492 |
GCP-2021-004
Published: 2021-05-06Description
Description | Severity | Notes |
---|---|---|
The Envoy and Istio projects recently announced several new security vulnerabilities (CVE-2021-28683, CVE-2021-28682 and CVE-2021-29258), that could allow an attacker to crash Envoy. Google Kubernetes Engine clusters do not run Istio by default and are not vulnerable. If Istio has been installed in a cluster and configured to expose services to the internet, those services may be vulnerable to denial of service. Google Distributed Cloud Virtual for Bare Metal and GKE on VMware use Envoy by default for Ingress, so Ingress services may be vulnerable to denial of service. For instructions and more details, see the following security bulletins: |
Medium |
GCP-2021-003
Published: 2021-04-19Description
Description | Severity | Notes |
---|---|---|
The Kubernetes project recently announced a new security vulnerability, CVE-2021-25735, that could allow node updates to bypass a Validating Admission Webhook.
In a scenario where an attacker has sufficient
privileges and where a Validating Admission Webhook is implemented that
uses old For instructions and more details, see the following security bulletins: |
Medium |
GCP-2021-002
Published: 2021-03-05Description
Description | Severity | Notes |
---|---|---|
Per VMware security advisory VMSA-2021-0002, VMware received reports of multiple vulnerabilities in VMware ESXi and vSphere Client (HTML5). VMware has made updates available to remediate these vulnerabilities in affected VMware products. We have applied the officially documented workarounds for the vSphere stack per the VMware security advisory. This update addresses security vulnerabilities described in CVE-2021-21972, CVE-2021-21973, and CVE-2021-21974. VMware Engine impactBased on our investigations, no customers were found to be impacted. What should I do?Because VMware Engine clusters are not affected by this vulnerability, no further action is required. |
Critical |
GCP-2021-001
Published: 2021-01-28Description
Description | Severity | Notes |
---|---|---|
A vulnerability was recently discovered in the Linux utility The underlying infrastructure that runs Compute Engine is not impacted by this vulnerability. All Google Kubernetes Engine (GKE), GKE on VMware, GKE on AWS, and Google Distributed Cloud Virtual for Bare Metal clusters are not affected by this vulnerability. For instructions and more details, see the following security bulletins: |
None | CVE-2021-3156 |
GCP-2020-015
Published: 2020-12-07Updated: 2020-12-22
Description
Description | Severity | Notes |
---|---|---|
Updated: 2021-12-22 The command for GKE
in the following section should use
gcloud container clusters update –no-enable-service-externalips Updated: 2021-12-15 For GKE, the following mitigation is now available:
For more information, see Hardening your cluster's security. The Kubernetes project recently discovered a new security vulnerability, CVE-2020-8554, that might allow an attacker who has obtained permissions to create a Kubernetes Service of type LoadBalancer or ClusterIP to intercept network traffic originating from other Pods in the cluster. This vulnerability by itself does not give an attacker permissions to create a Kubernetes Service. All Google Kubernetes Engine (GKE), GKE on VMware, and GKE on AWS clusters are affected by this vulnerability. What should I do?For instructions and more details, see the: |
Medium |
CVE-2020-8554 |
GCP-2020-014
Published: 2020-10-20Updated: 2020-10-20
Description
Description | Severity | Notes |
---|---|---|
The Kubernetes project recently discovered several issues that allow for the exposure of secret data when verbose logging options are enabled. The issues are:
What should I do?No further action is required due to the default verbosity logging levels of GKE. |
None |
Google Cloud impact
Per-product details are listed below.
Product |
Impact |
---|---|
Google Kubernetes Engine (GKE) is not affected. |
|
GKE On-Prem is not affected. |
|
GKE on AWS is not affected. |
GCP-2020-013
Published: 2020-09-29Description
Microsoft has disclosed the following vulnerability:
Vulnerability |
Severity |
CVE |
---|---|---|
CVE-2020-1472 — A vulnerability in Windows Server allows attackers to use Netlogon Remote Protocol to run a specially-crafted application on a device on the network. |
NVD Base Score: 10 (Critical) |
For more information, see the Microsoft disclosure.
Google Cloud impact
The infrastructure hosting the Google Cloud and Google products is not impacted by this vulnerability. Additional per-product details are listed below.
Product |
Impact |
---|---|
Compute Engine |
CVE-2020-1472 |
Google Kubernetes Engine |
CVE-2020-1472 |
Managed Service for Microsoft Active Directory |
CVE-2020-1472 |
Google Workspace |
No customer action is required. This service is not impacted by this vulnerability. |
App Engine standard environment |
No customer action is required. This service is not impacted by this vulnerability. |
App Engine flexible environment |
No customer action is required. This service is not impacted by this vulnerability. |
Cloud Run |
No customer action is required. This service is not impacted by this vulnerability. |
Cloud Functions |
No customer action is required. This service is not impacted by this vulnerability. |
Cloud Composer |
No customer action is required. This service is not impacted by this vulnerability. |
Dataflow |
No customer action is required. This service is not impacted by this vulnerability. |
Dataproc |
No customer action is required. This service is not impacted by this vulnerability. |
Cloud SQL |
No customer action is required. This service is not impacted by this vulnerability. |
GCP-2020-012
Published: 2020-09-14Updated: 2020-09-17
Description
Description | Severity | Notes |
---|---|---|
A vulnerability was recently discovered in the Linux kernel, described in CVE-2020-14386, that may allow container escape to obtain root privileges on the host node. All GKE nodes are affected. Pods running in GKE Sandbox are not able to leverage this vulnerability. For instructions and more details, see the: What vulnerability is addressed by this patch? The patch mitigates the following vulnerability: The vulnerability CVE-2020-14386, which allows containers with CAP_NET_RAW to write 1 to 10 bytes of kernel memory, and possibly escape the container and obtain root privileges on the host node. This is rated as a High severity vulnerability. |
High |
GCP-2020-011
Published: 2020-07-24Description
Description | Severity | Notes |
---|---|---|
A networking vulnerability, CVE-2020-8558, was recently discovered in Kubernetes. Services sometimes communicate with other applications running inside the same Pod using the local loopback interface (127.0.0.1). This vulnerability allows an attacker with access to the cluster's network to send traffic to the loopback interface of adjacent Pods and nodes. Services that rely on the loopback interface not being accessible outside their Pod could be exploited. For instructions and more details, see the: |
Low (GKE and GKE on AWS), |
GCP-2020-010
Published: 2020-07-27Description
Microsoft has disclosed the following vulnerability:
Vulnerability |
Severity |
CVE |
---|---|---|
CVE-2020-1350 — Windows Servers that serve in a DNS server capacity can be exploited to run untrusted code by the Local System Account. |
NVD Base Score: 10.0 (Critical) |
For more information, see the Microsoft disclosure.
Google Cloud impact
The infrastructure hosting the Google Cloud and Google products is not impacted by this vulnerability. Additional per-product details are listed below.
Product |
Impact |
---|---|
Compute Engine |
CVE-2020-1350 |
Google Kubernetes Engine |
CVE-2020-1350 |
Managed Service for Microsoft Active Directory |
CVE-2020-1350 |
Google Workspace |
No customer action is required. This service is not impacted by this vulnerability. |
App Engine standard environment |
No customer action is required. This service is not impacted by this vulnerability. |
App Engine flexible environment |
No customer action is required. This service is not impacted by this vulnerability. |
Cloud Run |
No customer action is required. This service is not impacted by this vulnerability. |
Cloud Functions |
No customer action is required. This service is not impacted by this vulnerability. |
Cloud Composer |
No customer action is required. This service is not impacted by this vulnerability. |
Dataflow |
No customer action is required. This service is not impacted by this vulnerability. |
Dataproc |
No customer action is required. This service is not impacted by this vulnerability. |
Cloud SQL |
No customer action is required. This service is not impacted by this vulnerability. |
GCP-2020-009
Published: 2020-07-15Description
Description | Severity | Notes |
---|---|---|
A privilege escalation vulnerability, CVE-2020-8559, was recently discovered in Kubernetes. This vulnerability allows an attacker that has already compromised a node to execute a command in any Pod in the cluster. The attacker can thereby use the already compromised node to compromise other nodes and potentially read information, or cause destructive actions. Note that for an attacker to exploit this vulnerability, a node in your cluster must have already been compromised. This vulnerability, by itself, will not compromise any nodes in your cluster. For instructions and more details, see the: |
Medium |
GCP-2020-008
Published: 2020-06-19Description
Description | Severity | Notes |
---|---|---|
DescriptionVMs that have OS Login enabled might be susceptible to privilege escalation vulnerabilities. These vulnerabilities gives users that are granted OS Login permissions (but not given admin access) the ability to escalate to root access in the VM. For instructions and more details, see the Compute Engine security bulletin.
|
High |
GCP-2020-007
Published: 2020-06-01Description
Description | Severity | Notes |
---|---|---|
Server Side Request Forgery (SSRF) vulnerability, CVE-2020-8555, was recently discovered in Kubernetes, allowing certain authorized users to leak up to 500 bytes of sensitive information from the control plane host network. The Google Kubernetes Engine (GKE) control plane uses controllers from Kubernetes and is thus affected by this vulnerability. We recommend that you upgrade the control plane to the latest patch version. A node upgrade is not required. For instructions and more details, see the: |
Medium |
GCP-2020-006
Published: 2020-06-01Description
Description | Severity | Notes |
---|---|---|
Kubernetes has disclosed a vulnerability that allows a privileged container to redirect node traffic to another container. Mutual TLS/SSH traffic, such as between the kubelet and API server or traffic from applications using mTLS cannot be read or modified by this attack. All Google Kubernetes Engine (GKE) nodes are affected by this vulnerability, and we recommend that you upgrade to the latest patch version. For instructions and more details, see the: |
Medium |
GCP-2020-005
Published: 2020-05-07Description
Vulnerability |
Severity |
CVE |
---|---|---|
A vulnerability was recently discovered in the Linux kernel, described in CVE-2020-8835, allowing container escape to obtain root privileges on the host node. Google Kubernetes Engine (GKE) Ubuntu nodes running GKE 1.16 or 1.17 are affected by this vulnerability, and we recommend that you upgrade to the latest patch version as soon as possible. Please see the GKE security bulletin for instructions and more details. |
High |
GCP-2020-004
Published: 2020-03-31Updated: 2020-03-31
Description
Kubernetes has disclosed the following vulnerabulities:
Vulnerability |
Severity |
CVE |
---|---|---|
CVE-2019-11254 — This is a Denial of Service (DoS) vulnerability that impacts the API server. |
Medium |
See the GKE on VMware security bulletin for instructions and more details.
GCP-2020-003
Published: 2020-03-31Updated: 2020-03-31
Description
Kubernetes has disclosed the following vulnerabulities:
Vulnerability |
Severity |
CVE |
---|---|---|
CVE-2019-11254 — This is a Denial of Service (DoS) vulnerability that impacts the API server. |
Medium |
See the GKE security bulletin for instructions and more details.
GCP-2020-002
Published: 2020-03-23Updated: 2020-03-23
Description
Kubernetes has disclosed the following vulnerabulities:
Vulnerability |
Severity |
CVE |
---|---|---|
CVE-2020-8551 — This is a Denial of Service (DoS) vulnerability that impacts the kubelet. |
Medium |
|
CVE-2020-8552 — This is a Denial of Service (DoS) vulnerability that impacts the API server. |
Medium |
See the GKE security bulletin for instructions and more details.
GCP-2020-001
Published: 2020-01-21Updated: 2020-01-21
Description
Microsoft has disclosed the following vulnerability:
Vulnerability |
Severity |
CVE |
---|---|---|
CVE-2020-0601 — This vulnerability is also known as the Windows Crypto API Spoofing Vulnerability. It could be exploited to make malicious executables appear trusted or allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software. |
NVD Base Score: 8.1 (High) |
For more information, see the Microsoft disclosure.
Google Cloud impact
The infrastructure hosting the Google Cloud and Google products is not impacted by this vulnerability. Additional per-product details are listed below.
Product |
Impact |
---|---|
Compute Engine |
CVE-2020-0601 |
Google Kubernetes Engine |
CVE-2020-0601 |
Managed Service for Microsoft Active Directory |
CVE-2020-0601 |
Google Workspace |
No customer action is required. This service is not impacted by this vulnerability. |
App Engine standard environment |
No customer action is required. This service is not impacted by this vulnerability. |
App Engine flexible environment |
No customer action is required. This service is not impacted by this vulnerability. |
Cloud Run |
No customer action is required. This service is not impacted by this vulnerability. |
Cloud Functions |
No customer action is required. This service is not impacted by this vulnerability. |
Cloud Composer |
No customer action is required. This service is not impacted by this vulnerability. |
Dataflow |
No customer action is required. This service is not impacted by this vulnerability. |
Dataproc |
No customer action is required. This service is not impacted by this vulnerability. |
Cloud SQL |
No customer action is required. This service is not impacted by this vulnerability. |
GCP-2019-001
Published: 2019-11-12Updated: 2019-11-12
Description
Intel has disclosed the following vulnerabilities:
Vulnerability |
Severity |
CVE |
---|---|---|
CVE-2019-11135 — This vulnerability referred to as TSX Async Abort (TAA) can be used to exploit speculative execution within a TSX transaction. This vulnerability potentially allows data to be exposed via the same microarchitectural data structures exposed by Microarchitectural Data Sampling (MDS). |
Medium |
|
CVE-2018-12207 — This is a Denial of Service (DoS) vulnerability affecting virtual machine hosts (not guests). This issue is known as "Machine Check Error on Page Size Change." |
Medium |
For more information, see the Intel disclosures:
Google Cloud impact
The infrastructure hosting the Google Cloud and Google products is protected from these vulnerabilities. Additional per-product details are listed below.
Product |
Impact |
---|---|
Compute Engine |
CVE-2019-11135 CVE-2018-12207 |
Google Kubernetes Engine |
CVE-2019-11135 CVE-2018-12207 |
App Engine standard environment |
No additional action is required. |
App Engine flexible environment |
CVE-2019-11135 CVE-2018-12207 |
Cloud Run |
No additional action is required. |
Cloud Functions |
No additional action is required. |
Cloud Composer |
No additional action is required. |
Dataflow |
CVE-2019-11135 CVE-2018-12207 |
Dataproc |
CVE-2019-11135 CVE-2018-12207 |
Cloud SQL |
No additional action is required. |