Bug 1961365 (CVE-2021-25738)

Summary: CVE-2021-25738 kubernetes-client: Loading specially-crafted yaml can lead to code execution
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aileenc, akoufoud, alazarot, anstephe, chazlett, gmalinko, ibek, janstey, jochrist, jrokos, jwon, kaycoth, kverlaen, mnovotny, pantinor, pjindal
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kubernetes-client 12.0.0, kubernetes-client 11.0.1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1961366    

Description Pedro Sampaio 2021-05-17 18:55:08 UTC
A security issue was discovered in the Kubernetes Java client library where loading specially-crafted yaml can lead to code execution.

References:

https://groups.google.com/g/kubernetes-announce/c/Nt5AP_lMK0E/m/zWRKduXsAQAJ
https://github.com/kubernetes-client/java/issues/1698

Comment 1 Jonathan Christison 2021-05-19 12:41:13 UTC
Fixing commit: https://github.com/kubernetes-client/java/pull/1676