Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-11254

Опубликовано: 27 мар. 2020
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

Отчет

The upstream Kubernetes fix for this vulnerability is to update the version of the Go dependency, gopkg.in/yaml.v2. This issue affects OpenShift Container Platform components that use versions before 2.2.8 of gopkg.in/yaml.v2 and accept YAML payloads.

Меры по смягчению последствий

Prevent unauthenticated or unauthorized access to the API server

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 4openshift4/ose-hypershiftWill not fix
Red Hat OpenShift Container Platform 4openshift4/ose-k8s-prometheus-adapter-rhel9Not affected
Red Hat OpenShift Container Platform 4openshift4/ose-openshift-state-metrics-rhel8Not affected
Red Hat OpenShift Container Platform 4openshift4/ose-service-catalogWill not fix
Red Hat OpenShift Container Platform 3.11atomic-openshiftFixedRHSA-2020:247918.06.2020
Red Hat OpenShift Container Platform 4.3openshift4/ose-openshift-apiserver-rhel7FixedRHSA-2020:093301.04.2020
Red Hat OpenShift Container Platform 4.5openshift4/ose-hyperkubeFixedRHSA-2020:241213.07.2020
Red Hat OpenShift Container Platform 4.5openshift4/ose-oauth-server-rhel7FixedRHSA-2020:241213.07.2020
Red Hat OpenShift Container Platform 4.5openshiftFixedRHSA-2020:241313.07.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1819486kubernetes: Denial of service in API server via crafted YAML payloads by authorized users

EPSS

Процентиль: 30%
0.0011
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 5 лет назад

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

CVSS3: 6.5
nvd
около 5 лет назад

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

CVSS3: 6.5
debian
около 5 лет назад

The Kubernetes API Server component in versions 1.1-1.14, and versions ...

CVSS3: 6.5
github
больше 3 лет назад

Excessive Platform Resource Consumption within a Loop in Kubernetes

oracle-oval
около 5 лет назад

ELSA-2020-5653: olcne kubernetes security update (IMPORTANT)

EPSS

Процентиль: 30%
0.0011
Низкий

6.5 Medium

CVSS3