First published: Fri Sep 27 2019(Updated: )
A flaw was found kubernetes. The parsing of YAML manifests by the Kubernetes API server could lead to a denial-of-service attack leaving it vulnerable to an instance of a "billion laughs" attack. The highest threat from this vulnerability is to system availability.
Credit: jordan@liggitt.net jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jaeger | <0:v1.13.1.redhat5-1.el7 | 0:v1.13.1.redhat5-1.el7 |
redhat/jaeger-operator | <0:v1.13.1.redhat8-1.el7 | 0:v1.13.1.redhat8-1.el7 |
redhat/kiali | <0:v1.0.7.redhat1-1.el7 | 0:v1.0.7.redhat1-1.el7 |
redhat/servicemesh | <0:1.0.2-3.el8 | 0:1.0.2-3.el8 |
redhat/servicemesh-cni | <0:1.0.2-3.el8 | 0:1.0.2-3.el8 |
redhat/servicemesh-grafana | <0:6.2.2-24.el8 | 0:6.2.2-24.el8 |
redhat/servicemesh-operator | <0:1.0.2-7.el8 | 0:1.0.2-7.el8 |
redhat/servicemesh-prometheus | <0:2.7.2-25.el8 | 0:2.7.2-25.el8 |
redhat/servicemesh-proxy | <0:1.0.2-3.el8 | 0:1.0.2-3.el8 |
redhat/servicemesh-grafana | <0:6.2.2-38.el8 | 0:6.2.2-38.el8 |
redhat/servicemesh-prometheus | <0:2.7.2-36.el8 | 0:2.7.2-36.el8 |
redhat/servicemesh-cni | <0:1.0.11-1.el8 | 0:1.0.11-1.el8 |
redhat/servicemesh-operator | <0:1.1.4-3.el8 | 0:1.1.4-3.el8 |
redhat/servicemesh-grafana | <0:6.4.3-11.el8 | 0:6.4.3-11.el8 |
redhat/servicemesh-cni | <0:1.1.4-2.el8 | 0:1.1.4-2.el8 |
redhat/atomic-openshift | <0:3.10.181-1.git.0.3ab4b3d.el7 | 0:3.10.181-1.git.0.3ab4b3d.el7 |
redhat/atomic-openshift | <0:3.11.154-1.git.0.7a097ad.el7 | 0:3.11.154-1.git.0.7a097ad.el7 |
redhat/atomic-openshift | <0:3.9.102-1.git.0.6411f52.el7 | 0:3.9.102-1.git.0.6411f52.el7 |
redhat/openshift | <0:4.1.20-201910101746.git.0.a80aad5.el8 | 0:4.1.20-201910101746.git.0.a80aad5.el8 |
Kubernetes Kubernetes | >=1.1.0<=1.12.10 | |
Kubernetes Kubernetes | >=1.13.0<1.13.2 | |
Kubernetes Kubernetes | >=1.14.0<1.14.8 | |
Kubernetes Kubernetes | >=1.15.0<1.15.5 | |
Kubernetes Kubernetes | >=1.16.0<1.16.2 | |
Redhat Openshift Container Platform | =3.9 | |
Redhat Openshift Container Platform | =3.10 | |
Redhat Openshift Container Platform | =3.11 | |
go/k8s.io/kubernetes | >=1.16.0<1.16.2 | 1.16.2 |
go/k8s.io/kubernetes | >=1.15.0<1.15.5 | 1.15.5 |
go/k8s.io/kubernetes | >=1.14.0<1.14.8 | 1.14.8 |
go/k8s.io/kubernetes | >=1.0.0<1.13.12 | 1.13.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-11253 is a vulnerability in Kubernetes that allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unresponsive.
CVE-2019-11253 can result in the Kubernetes API server consuming excessive CPU or memory, potentially leading to crash and unresponsiveness.
CVE-2019-11253 has a severity level of 7.5 (high).
Versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 are affected by CVE-2019-11253.
To fix CVE-2019-11253, ensure that you update your Kubernetes version to at least v1.13.12, v1.14.8, v1.15.5, or v1.16.2.