Description
In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4885 | In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server. |
Github GHSA |
GHSA-q4rr-64r9-fwgf | Kubernetes DoS Vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: dwf
Published:
Updated: 2024-08-05T03:00:19.258Z
Reserved: 2019-04-01T00:00:00.000Z
Link: CVE-2019-1002100
No data.
Status : Modified
Published: 2019-04-01T14:29:00.483
Modified: 2024-11-21T04:17:42.613
Link: CVE-2019-1002100
OpenCVE Enrichment
No data.
EUVD
Github GHSA