Описание
Excessive Platform Resource Consumption within a Loop in Kubernetes
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-11254
- https://github.com/kubernetes/kubernetes/issues/89535
- https://github.com/go-yaml/yaml/pull/555
- https://github.com/kubernetes/kubernetes/pull/87467/commits/b86df2bec4f377afc0ca03482ffad2f0a49a83b8
- https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18496
- https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ
- https://pkg.go.dev/vuln/GO-2020-0036
- https://security.netapp.com/advisory/ntap-20200413-0003
Пакеты
gopkg.in/yaml.v2
< 2.2.8
2.2.8
github.com/go-yaml/yaml
<= 2.1.0
Отсутствует
Связанные уязвимости
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
The Kubernetes API Server component in versions 1.1-1.14, and versions ...
ELSA-2020-5653: olcne kubernetes security update (IMPORTANT)