First published: Fri Mar 27 2020(Updated: )
A denial of service vulnerability was found in the kube-apiserver, allowing authorized users sending malicious YAML payloads to cause kube-apiserver to consume excessive CPU cycles while parsing YAML. Upstream Issue: <a href="https://github.com/kubernetes/kubernetes/issues/89535">https://github.com/kubernetes/kubernetes/issues/89535</a>
Credit: jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
Kubernetes Kubernetes | <1.15.10 | |
Kubernetes Kubernetes | >=1.16.0<1.16.7 | |
Kubernetes Kubernetes | >=1.17.0<1.17.3 | |
redhat/atomic-openshift | <0:3.11.232-1.git.0.a5bc32f.el7 | 0:3.11.232-1.git.0.a5bc32f.el7 |
redhat/openshift | <0:4.5.0-202007012112.p0.git.0.582d7fc.el8 | 0:4.5.0-202007012112.p0.git.0.582d7fc.el8 |
Prevent unauthenticated or unauthorized access to the API server
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-11254 is a vulnerability in the Kubernetes API Server component that allows an authorized user to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML payloads.
CVE-2019-11254 affects Kubernetes versions 1.1-1.14 and versions prior to 1.15.10, 1.16.7, and 1.17.3.
CVE-2019-11254 has a severity rating of 6.5 (medium).
To fix CVE-2019-11254, update your Kubernetes version to 1.15.10, 1.16.7, or 1.17.3.
You can find more information about CVE-2019-11254 on the CVE website, NIST's vulnerability database, and Red Hat's security advisories.