First published: Tue Feb 26 2019(Updated: )
In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.
Credit: josh@bress.net josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
go/k8s.io/kubernetes | >=1.13.0<=1.13.3 | 1.13.4 |
go/k8s.io/kubernetes | >=1.12.0<=1.12.5 | 1.12.6 |
go/k8s.io/kubernetes | >=1.11.0<=1.11.7 | 1.11.8 |
go/k8s.io/kubernetes | >=1.0<=1.10 | |
redhat/kube-apiserver | <1.11.8 | 1.11.8 |
redhat/kube-apiserver | <1.12.6 | 1.12.6 |
redhat/kube-apiserver | <1.13.4 | 1.13.4 |
redhat/atomic-openshift | <0:3.10.181-1.git.0.3ab4b3d.el7 | 0:3.10.181-1.git.0.3ab4b3d.el7 |
redhat/atomic-openshift | <0:3.11.129-1.git.0.bd4f2d5.el7 | 0:3.11.129-1.git.0.bd4f2d5.el7 |
redhat/jenkins | <2-plugins-0:3.11.1560870549-1.el7 | 2-plugins-0:3.11.1560870549-1.el7 |
Kubernetes Kubernetes | <1.11.8 | |
Kubernetes Kubernetes | >=1.12.0<1.12.6 | |
Kubernetes Kubernetes | >=1.13.0<1.13.4 | |
Redhat Openshift Container Platform | =3.10 | |
Redhat Openshift Container Platform | =3.11 |
Remove ‘patch’ permissions from untrusted users.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this denial of service vulnerability is CVE-2019-1002100.
The severity level of CVE-2019-1002100 is medium with a score of 6.5.
All Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4 are affected by CVE-2019-1002100.
The recommended remedy for CVE-2019-1002100 is to update Kubernetes to version 1.11.8, 1.12.6, or 1.13.4.
You can find more information about CVE-2019-1002100 on the NIST NVD website, the Kubernetes GitHub page, and the Red Hat errata page.