CVE-2019-1002100

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*
cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*

History

01 Mar 2023, 14:54

Type Values Removed Values Added
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:3239 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:3239 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1851 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1851 - Third Party Advisory
References (CONFIRM) https://github.com/kubernetes/kubernetes/issues/74534 - Third Party Advisory (CONFIRM) https://github.com/kubernetes/kubernetes/issues/74534 - Issue Tracking, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/107290 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/107290 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) https://groups.google.com/forum/#!topic/kubernetes-announce/vmUUNkYfG9g - Third Party Advisory (CONFIRM) https://groups.google.com/forum/#!topic/kubernetes-announce/vmUUNkYfG9g - Mailing List, Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20190416-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20190416-0002/ - Third Party Advisory
CPE cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*

Information

Published : 2019-04-01 14:29

Updated : 2024-02-04 20:20


NVD link : CVE-2019-1002100

Mitre link : CVE-2019-1002100

CVE.ORG link : CVE-2019-1002100


JSON object : View

Products Affected

kubernetes

  • kubernetes

redhat

  • openshift_container_platform
CWE
CWE-770

Allocation of Resources Without Limits or Throttling