Azure Kubernetes Service updates for Linux Kernel (SACK) vulnerabilities (CVE-2019-11477, CVE-2019-11478, CVE-2019-11479)
You’re receiving this email because you currently use Microsoft Azure Kubernetes Service.
On Monday June 17th, security researchers announced 3 critical security issues impacting the Linux kernel. These are:
·
CVE-2019-11477: SACK Panic
·
CVE-2019-11478: SACK Slowness
·
CVE-2019-11479: Excess Resource Consumption Due to Low MSS Values
These CVEs have been patched by all major Linux vendors. This means your clusters must be updated to mitigate these security issues.
All Azure Kubernetes Service (AKS) customers running unpatched kernels are potentially vulnerable to these security issues. We recommend all customers verify the running kernel and
take action if required to apply these updates.
Canonical issued updated, patched kernels and these updated kernels were made available to the AKS customer base as of 2019-06-19.
AKS clusters using the default configuration were patched as of the automatic update on 2019-06-20 00:00 UTC; however, users must reboot their clusters for the patch
to take effect.
Customers with clusters created before Friday, June 28, 2019 should confirm their nodes are updated.
|