{
  "threat_severity" : "Moderate",
  "public_date" : "2019-08-07T00:00:00Z",
  "bugzilla" : {
    "description" : "kubernetes: /debug/pprof endpoint exposed on kubelet's healthz port",
    "id" : "1738368",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1738368"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
    "status" : "draft"
  },
  "cwe" : "CWE-284",
  "details" : [ "The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration." ],
  "statement" : "OpenShift Container Platform 3 is not vulnerable to this flaw as the kubelet healthz server is disabled by default. OpenShift Container Platform 4 enables the /debug/pprof endpoint on the kubelet healthz server to local traffic only.\nThere are multiple reasons why this has been rated as moderate by Red Hat.\n1. Firstly, even though the endpoint is vulnerable, not all Kubernetes deployments expose the healthz  /debug/pprof interface to untrusted networks. Many use network policies or restrict that port to internal or localhost. SUSE’s advisory explicitly notes that the debugging endpoint “is not exposed by the default configuration.”\n2. While the biggest impact is confidentiality, theoretical leakage of internal state or memory, there is no integrity or full service takeover.",
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.10",
    "fix_state" : "Not affected",
    "package_name" : "atomic-openshift",
    "cpe" : "cpe:/a:redhat:openshift:3.10"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Not affected",
    "package_name" : "atomic-openshift",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.9",
    "fix_state" : "Not affected",
    "package_name" : "atomic-openshift",
    "cpe" : "cpe:/a:redhat:openshift:3.9"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Fix deferred",
    "package_name" : "openshift",
    "cpe" : "cpe:/a:redhat:openshift:4",
    "impact" : "low"
  }, {
    "product_name" : "Red Hat Storage 3",
    "fix_state" : "Not affected",
    "package_name" : "heketi",
    "cpe" : "cpe:/a:redhat:storage:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2019-11248\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-11248\nhttps://groups.google.com/forum/#!topic/kubernetes-security-announce/pKELclHIov8" ],
  "name" : "CVE-2019-11248",
  "csaw" : false
}