CVE-2019-1002100

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*

History

07 Nov 2023, 03:02

Type Values Removed Values Added
References
  • {'url': 'https://groups.google.com/forum/#!topic/kubernetes-announce/vmUUNkYfG9g', 'name': 'https://groups.google.com/forum/#!topic/kubernetes-announce/vmUUNkYfG9g', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () https://groups.google.com/forum/#%21topic/kubernetes-announce/vmUUNkYfG9g -

Information

Published : 2019-04-01 14:29

Updated : 2023-11-07 03:02


NVD link : CVE-2019-1002100

Mitre link : CVE-2019-1002100


JSON object : View

Products Affected

redhat

  • openshift_container_platform

kubernetes

  • kubernetes
CWE
CWE-770

Allocation of Resources Without Limits or Throttling