Hide Forgot
A security issue was discovered in kube-apiserver versions before v1.11.8, v1.12.6, or v1.13.4. Users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type “json-patch” (e.g.`kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.
References: https://groups.google.com/forum/#!topic/kubernetes-announce/vmUUNkYfG9g https://github.com/kubernetes/kubernetes/issues/74534 Upstream Patch: https://github.com/kubernetes/kubernetes/pull/74000
Gluster ships kube-apiserver via heketi, however we don't use it to provision Gluster server hence the vulnerability is not exposed in a way that would be exploitable within Gluster. Affected as the kube-apiserver code shipped with heketi is unpatched but most likely wontfix thing.
External References: https://groups.google.com/forum/#!topic/kubernetes-announce/vmUUNkYfG9g
Mitigation: Remove ‘patch’ permissions from untrusted users.
Acknowledgments: Name: Carl Henrik Lunde
Upstream Patches: https://github.com/kubernetes/kubernetes/commit/8a2d338b (1.11.8) https://github.com/kubernetes/kubernetes/commit/8a09eb39 (1.12.6) https://github.com/kubernetes/kubernetes/commit/de5b047e (1.13.3)
Statement: This issue affects the Kubernetes API Server, shipped in OpenShift Container Platform versions 3.4 through 3.11 as part of the atomic-openshift package. Red Hat Product Security has rated this issue as having a security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2019:1851 https://access.redhat.com/errata/RHSA-2019:1851
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-1002100
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.10 Via RHSA-2019:3239 https://access.redhat.com/errata/RHSA-2019:3239