First published: Mon Dec 20 2021(Updated: )
A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kubernetes-client | <5.0.3 | 5.0.3 |
redhat/kubernetes-client | <5.1.2 | 5.1.2 |
redhat/kubernetes-client | <5.3.2 | 5.3.2 |
redhat/kubernetes-client | <5.4.2 | 5.4.2 |
redhat/kubernetes-client | <5.7.4 | 5.7.4 |
redhat/kubernetes-client | <5.8.1 | 5.8.1 |
redhat/kubernetes-client | <5.11.2 | 5.11.2 |
redhat/jenkins | <2-plugins-0:4.13.1684911916-1.el8 | 2-plugins-0:4.13.1684911916-1.el8 |
maven/io.fabric8:kubernetes-client | >=5.11.0<5.11.2 | 5.11.2 |
maven/io.fabric8:kubernetes-client | >=5.9.0<5.10.2 | 5.10.2 |
maven/io.fabric8:kubernetes-client | >=5.8.0<5.8.1 | 5.8.1 |
maven/io.fabric8:kubernetes-client | >=5.5.0<5.7.4 | 5.7.4 |
maven/io.fabric8:kubernetes-client | >=5.2.0<5.3.2 | 5.3.2 |
maven/io.fabric8:kubernetes-client | >=5.1.0<5.1.2 | 5.1.2 |
maven/io.fabric8:kubernetes-client | >=5.0.0-beta-1<5.0.3 | 5.0.3 |
Redhat Fabric8-kubernetes | >=5.0.1<5.0.3 | |
Redhat Fabric8-kubernetes | >=5.1.0<5.1.2 | |
Redhat Fabric8-kubernetes | >=5.2.0<5.3.2 | |
Redhat Fabric8-kubernetes | >=5.5.0<5.7.4 | |
Redhat Fabric8-kubernetes | >=5.9.0<5.10.2 | |
Redhat Fabric8-kubernetes | >=5.11.0<5.11.2 | |
Redhat Fabric8-kubernetes | =5.0.0-beta1 | |
Redhat Fabric8-kubernetes | =5.8.0 | |
Redhat A-mq Streams | =2.0.1 | |
Redhat Build Of Quarkus | =2.2.5 | |
Redhat Descision Manager | =7.0 | |
Redhat Fuse | =7.11 | |
Redhat Integration Camel K | ||
Redhat Integration Camel Quarkus | =2.2.1 | |
Redhat Openshift Application Runtimes | ||
Redhat Process Automation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-4178 is an arbitrary code execution flaw in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above.
CVE-2021-4178 allows a local and privileged attacker to supply malicious YAML due to an improperly configured YAML parsing.
The severity of CVE-2021-4178 is medium with a CVSS score of 6.7.
To fix CVE-2021-4178, update the Fabric 8 Kubernetes client to version 5.0.3 or higher.
More information about CVE-2021-4178 can be found in the following references: [link_1], [link_2], [link_3].