Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-11254

Опубликовано: 01 апр. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4
CVSS3: 6.5

Описание

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

ignored

end of life
esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needs-triage
groovy

ignored

end of life
hirsute

ignored

end of life

Показывать по

EPSS

Процентиль: 30%
0.0011
Низкий

4 Medium

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
около 5 лет назад

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

CVSS3: 6.5
nvd
около 5 лет назад

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

CVSS3: 6.5
debian
около 5 лет назад

The Kubernetes API Server component in versions 1.1-1.14, and versions ...

CVSS3: 6.5
github
больше 3 лет назад

Excessive Platform Resource Consumption within a Loop in Kubernetes

oracle-oval
около 5 лет назад

ELSA-2020-5653: olcne kubernetes security update (IMPORTANT)

EPSS

Процентиль: 30%
0.0011
Низкий

4 Medium

CVSS2

6.5 Medium

CVSS3