Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2019-11254: kube-apiserver Denial of Service vulnerability from malicious YAML payloads #89535

Closed
cjcullen opened this issue Mar 26, 2020 · 2 comments
Labels
kind/bug Categorizes issue or PR as related to a bug. needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. official-cve-feed Issues or PRs related to CVEs officially announced by Security Response Committee (SRC)

Comments

@cjcullen
Copy link
Member

cjcullen commented Mar 26, 2020

CVE-2019-11254 is a denial of service vulnerability in the kube-apiserver, allowing authorized users sending malicious YAML payloads to cause kube-apiserver to consume excessive CPU cycles while parsing YAML.

The issue was discovered via the fuzz test #83750.

Affected components:
Kubernetes API server

Affected versions:
<= v1.15.9, resolved in 1.15.10 by #87640
v1.16.0-v1.16.7, resolved in 1.16.8 by #87639
v1.17.0-v1.17.2, resolved in 1.17.3 by #87637
Fixed in master by #87467

How do I mitigate this vulnerability?
Prior to upgrading, these vulnerabilities can be mitigated by preventing unauthenticated or unauthorized access to kube-apiserver.

@cjcullen cjcullen added the kind/bug Categorizes issue or PR as related to a bug. label Mar 26, 2020
@k8s-ci-robot k8s-ci-robot added the needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. label Mar 26, 2020
@kubernetes kubernetes deleted a comment from k8s-ci-robot Mar 26, 2020
@cjcullen cjcullen changed the title WIP CVE-2019-11254: kube-apiserver Denial of Service vulnerability from malicious YAML payloads Mar 31, 2020
@PushkarJ
Copy link
Member

PushkarJ commented May 16, 2022

/label official-cve-feed

(Related to kubernetes/sig-security#1)

@k8s-ci-robot k8s-ci-robot added the official-cve-feed Issues or PRs related to CVEs officially announced by Security Response Committee (SRC) label May 16, 2022
@Julysun0
Copy link

Julysun0 commented Aug 23, 2022

What are the good upgrade plans

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug Categorizes issue or PR as related to a bug. needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. official-cve-feed Issues or PRs related to CVEs officially announced by Security Response Committee (SRC)
Projects
None yet
Development

No branches or pull requests

4 participants