Bug 1757701 (CVE-2019-11253)

Summary: CVE-2019-11253 kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: annelson, bdettelb, bmontgom, ckoep, dbecker, deads, dyocum, eparis, go-sig, hchiramm, hgomes, hvyas, ichavero, jbrooks, jburrell, jcajka, jchaloup, jjoyce, jmulligan, jokerman, jschluet, jschorr, kconner, lhh, lpeer, madam, mburns, nhorman, nstielau, puebele, rcernich, rhos-maint, rhs-bugs, sclewis, sfowler, sisharma, slinaber, sponnaga, sreber, storage-qa-internal, strigazi, tstclair, twalsh, vbatts, vbellur
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kubernetes 1.13.12, kubernetes 1.14.8, kubernetes 1.15.5, kubernetes 1.16.2 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found kubernetes. The parsing of YAML manifests by the Kubernetes API server could lead to a denial-of-service attack leaving it vulnerable to an instance of a "billion laughs" attack. The highest threat from this vulnerability is to system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-10-16 18:51:20 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1757702, 1757708, 1757709, 1757710, 1757711, 1757712, 1757887, 2032712, 2032713, 2032714    
Bug Blocks: 1757703    

Description Sam Fowler 2019-10-02 08:41:11 UTC
The parsing of YAML manifests by the Kubernetes API server could lead to a denial-of-service attack against a cluster’s Kubernetes API service, therefore leaving it vulnerable to an instance of a “billion laughs” attack.


Upstream Issue:

https://github.com/kubernetes/kubernetes/issues/83253


Reference:

https://www.stackrox.com/post/2019/09/protecting-kubernetes-api-against-cve-2019-11253-billion-laughs-attack/

Comment 1 Sam Fowler 2019-10-02 08:41:28 UTC
Created kubernetes tracking bugs for this issue:

Affects: fedora-all [bug 1757702]

Comment 11 errata-xmlrpc 2019-10-16 15:36:06 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.1

Via RHSA-2019:3132 https://access.redhat.com/errata/RHSA-2019:3132

Comment 12 Product Security DevOps Team 2019-10-16 18:51:20 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-11253

Comment 15 errata-xmlrpc 2019-10-29 16:21:22 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 3.10

Via RHSA-2019:3239 https://access.redhat.com/errata/RHSA-2019:3239

Comment 17 errata-xmlrpc 2019-11-07 16:54:26 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 3.9

Via RHSA-2019:3811 https://access.redhat.com/errata/RHSA-2019:3811

Comment 18 errata-xmlrpc 2019-11-18 16:21:58 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 3.11

Via RHSA-2019:3905 https://access.redhat.com/errata/RHSA-2019:3905

Comment 25 errata-xmlrpc 2020-07-01 18:45:34 UTC
This issue has been addressed in the following products:

  OpenShift Service Mesh 1.1

Via RHSA-2020:2799 https://access.redhat.com/errata/RHSA-2020:2799

Comment 26 errata-xmlrpc 2020-07-01 18:45:58 UTC
This issue has been addressed in the following products:

  OpenShift Service Mesh 1.1

Via RHSA-2020:2796 https://access.redhat.com/errata/RHSA-2020:2796

Comment 27 errata-xmlrpc 2020-07-01 18:46:28 UTC
This issue has been addressed in the following products:

  OpenShift Service Mesh 1.1

Via RHSA-2020:2795 https://access.redhat.com/errata/RHSA-2020:2795

Comment 28 errata-xmlrpc 2020-07-07 19:33:35 UTC
This issue has been addressed in the following products:

  OpenShift Service Mesh 1.0

Via RHSA-2020:2861 https://access.redhat.com/errata/RHSA-2020:2861

Comment 29 errata-xmlrpc 2020-07-07 19:34:05 UTC
This issue has been addressed in the following products:

  OpenShift Service Mesh 1.0

Via RHSA-2020:2863 https://access.redhat.com/errata/RHSA-2020:2863

Comment 30 errata-xmlrpc 2020-07-07 21:16:30 UTC
This issue has been addressed in the following products:

  OpenShift Service Mesh 1.0

Via RHSA-2020:2870 https://access.redhat.com/errata/RHSA-2020:2870

Comment 32 errata-xmlrpc 2022-05-11 11:34:20 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 16.2

Via RHSA-2022:2183 https://access.redhat.com/errata/RHSA-2022:2183