Skip to content

CVE-2022-1471 suggest to use using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. #2630

@wanghliu

Description

@wanghliu

Describe the bug
CVE-2022-1471 suggest to use using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. Could you please confirm if client-java 16.0.0 all used SnakeYaml's SafeConsturctor? if there is any impact by CVE-2022-1471 ?

Client Version
client-java is 16.0.0, dependency snakeyaml version 1.32

Kubernetes Version
e.g. 1.19.3

Java Version
e.g. Java 8

To Reproduce
Steps to reproduce the behavior:

Expected behavior
A clear and concise description of what you expected to happen.

KubeConfig
If applicable, add a KubeConfig file with secrets redacted.

Server (please complete the following information):

  • OS: [e.g. Linux]
  • Environment [e.g. container]
  • Cloud [e.g. Azure]

Additional context
Add any other context about the problem here.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions