Description
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2608 | The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML. |
Github GHSA |
GHSA-wxc4-f4m6-wwqv | Excessive Platform Resource Consumption within a Loop in Kubernetes |
References
History
No history.
Status: PUBLISHED
Assigner: kubernetes
Published:
Updated: 2024-09-16T23:16:55.380Z
Reserved: 2019-04-17T00:00:00.000Z
Link: CVE-2019-11254
No data.
Status : Modified
Published: 2020-04-01T21:15:13.397
Modified: 2024-11-21T04:20:48.840
Link: CVE-2019-11254
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA