SUSE-SU-2020:1573-1: moderate: Add features for Metrics Server, Cert Status Checker, VSphere VCP, and Cilium Envoy
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Jun 9 07:13:40 MDT 2020
SUSE Security Update: Add features for Metrics Server, Cert Status Checker, VSphere VCP, and Cilium Envoy
______________________________________________________________________________
Announcement ID: SUSE-SU-2020:1573-1
Rating: moderate
References: #1041090 #1047218 #1048688 #1086909 #1094448
#1095603 #1102920 #1121353 #1129568 #1138908
#1144068 #1151876 #1156450 #1159002 #1159003
#1159004 #1159539 #1162651 #1167073 #1169506
Cross-References: CVE-2019-18801 CVE-2019-18802 CVE-2019-18836
CVE-2019-18838
Affected Products:
SUSE CaaS Platform 4.0
______________________________________________________________________________
An update that solves four vulnerabilities and has 16 fixes
is now available.
Description:
Metrics Server
* Support monitoring of *CPU* and *memory* of a pod or node.
Cert Status Checker
* Exposes cluster-wide certificates status and use monitoring stack
(Prometheus and Grafana) to receives alerts by Prometheus
Alertmanager and monitors certificate status by Grafana dashboard.
VSphere VCP
* Allow Kubernetes pods to use VMWare vSphere Virtual Machine Disk
(VMDK) volumes as persistent storage.
Cilium Envoy
* Updated Cilium from version 1.5.3 to version 1.6.6
* Provide Envoy-proxy support for Cilium
* Envoy and its dependencies packaged for version 1.12.2
* Cilium uses CRD and ConfigMap points on etcd are removed
See release notes for installation instructions:
https://www.suse.com/releasenotes/x86_64/SUSE-CAASP/4/
Following CVE entries are relevant for the casp 4.2.1 update:
cilium-proxy:
CVE-2019-18801: An untrusted remote client might have been able to send
HTTP/2 requests via cilium-proxyx that could have written to the heap
outside of the request buffers when the upstream is HTTP/1. (bsc#1159002)
CVE-2019-18802: A malformed request header may have caused bypass of route
matchers resulting in escalation of privileges or information disclosure
(bsc#1159003) CVE-2019-18838: A malformed HTTP request without the Host
header may cause abnormal termination ofthe Envoy process (bsc#1159004)
CVE-2019-18836: Excessive iteration due to listener filter timeout in
envoy could lead to DoS (bsc#1156450)
kafka:
CVE-2018-1288: authenticated Kafka users may perform action reserved for
the Broker via a manually created fetch request. (bsc#1102920)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform Velum dashboard.
It will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- SUSE CaaS Platform 4.0 (x86_64):
caasp-release-4.2.1-24.23.4
skuba-1.3.5-3.39.1
terraform-provider-vsphere-1.17.3-3.3.4
- SUSE CaaS Platform 4.0 (noarch):
skuba-update-1.3.5-3.39.1
References:
https://www.suse.com/security/cve/CVE-2019-18801.html
https://www.suse.com/security/cve/CVE-2019-18802.html
https://www.suse.com/security/cve/CVE-2019-18836.html
https://www.suse.com/security/cve/CVE-2019-18838.html
https://bugzilla.suse.com/1041090
https://bugzilla.suse.com/1047218
https://bugzilla.suse.com/1048688
https://bugzilla.suse.com/1086909
https://bugzilla.suse.com/1094448
https://bugzilla.suse.com/1095603
https://bugzilla.suse.com/1102920
https://bugzilla.suse.com/1121353
https://bugzilla.suse.com/1129568
https://bugzilla.suse.com/1138908
https://bugzilla.suse.com/1144068
https://bugzilla.suse.com/1151876
https://bugzilla.suse.com/1156450
https://bugzilla.suse.com/1159002
https://bugzilla.suse.com/1159003
https://bugzilla.suse.com/1159004
https://bugzilla.suse.com/1159539
https://bugzilla.suse.com/1162651
https://bugzilla.suse.com/1167073
https://bugzilla.suse.com/1169506
More information about the sle-security-updates
mailing list