You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
mend-bolt-for-githubbot
changed the title
CVE-2019-11254 (Medium) detected in gopkg.in/yaml.v2-a3f3340b5840cee44f372bddb5880fcbc419b46a
CVE-2019-11254 (Medium) detected in github.com/go-yaml/yaml-v2.0.0
May 30, 2022
mend-bolt-for-githubbot
changed the title
CVE-2019-11254 (Medium) detected in github.com/go-yaml/yaml-v2.0.0
CVE-2019-11254 (Medium) detected in github.com/go-yaml/yaml-v2.0.0+incompatible
Dec 30, 2022
CVE-2019-11254 - Medium Severity Vulnerability
YAML support for the Go language.
Library home page: https://proxy.golang.org/github.com/go-yaml/yaml/@v/v2.0.0+incompatible.zip
Dependency Hierarchy:
Found in HEAD commit: 2f8b12df3a2bf883fe01937a9f307fb9fba89384
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
Publish Date: 2020-04-01
URL: CVE-2019-11254
Base Score Metrics:
Type: Upgrade version
Release Date: 2020-10-02
Fix Resolution: v2.2.8
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: