CVE-2021-4178
24.08.2022, 16:15
A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.Enginsight
Vendor | Product | Version |
---|---|---|
redhat | fabric8-kubernetes | 5.0.1 ≤ 𝑥 < 5.0.3 |
redhat | fabric8-kubernetes | 5.1.0 ≤ 𝑥 < 5.1.2 |
redhat | fabric8-kubernetes | 5.2.0 ≤ 𝑥 < 5.3.2 |
redhat | fabric8-kubernetes | 5.5.0 ≤ 𝑥 < 5.7.4 |
redhat | fabric8-kubernetes | 5.9.0 ≤ 𝑥 < 5.10.2 |
redhat | fabric8-kubernetes | 5.11.0 ≤ 𝑥 < 5.11.2 |
redhat | fabric8-kubernetes | 5.0.0:beta1 |
redhat | fabric8-kubernetes | 5.8.0 |
redhat | a-mq_streams | 2.0.1 |
redhat | build_of_quarkus | 2.2.5 |
redhat | descision_manager | 7.0 |
redhat | fuse | 7.11 |
redhat | integration_camel_k | - |
redhat | integration_camel_quarkus | 2.2.1 |
redhat | openshift_application_runtimes | - |
redhat | process_automation | 7.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References