The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: kubernetes
Published:
Updated: 2024-09-16T23:16:55.380Z
Reserved: 2019-04-17T00:00:00
Link: CVE-2019-11254

No data.

Status : Modified
Published: 2020-04-01T21:15:13.397
Modified: 2024-11-21T04:20:48.840
Link: CVE-2019-11254
