CVE-2021-4178
24.08.2022, 16:15
A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.Enginsight
| Vendor | Product | Version |
|---|---|---|
| redhat | fabric8-kubernetes | 5.0.1 ≤ 𝑥 < 5.0.3 |
| redhat | fabric8-kubernetes | 5.1.0 ≤ 𝑥 < 5.1.2 |
| redhat | fabric8-kubernetes | 5.2.0 ≤ 𝑥 < 5.3.2 |
| redhat | fabric8-kubernetes | 5.5.0 ≤ 𝑥 < 5.7.4 |
| redhat | fabric8-kubernetes | 5.9.0 ≤ 𝑥 < 5.10.2 |
| redhat | fabric8-kubernetes | 5.11.0 ≤ 𝑥 < 5.11.2 |
| redhat | fabric8-kubernetes | 5.0.0:beta1 |
| redhat | fabric8-kubernetes | 5.8.0 |
| redhat | a-mq_streams | 2.0.1 |
| redhat | build_of_quarkus | 2.2.5 |
| redhat | descision_manager | 7.0 |
| redhat | fuse | 7.11 |
| redhat | integration_camel_k | - |
| redhat | integration_camel_quarkus | 2.2.1 |
| redhat | openshift_application_runtimes | - |
| redhat | process_automation | 7.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References