You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
Preflight Checklist
Problem Description
YAML v2 has not been updated for a long time and it contains vulnerabilities (eg. CVE-2022-28948)
Proposed Solution
Since YAML v3 became the default, we should consider dropping YAML v2.
Alternatives Considered
YAML v2 could be moved to an external library.
Additional Information
YAML v3 is not fully backward compatible with v2, so we should wait couple months for feedback to make sure it's working as expected.
The text was updated successfully, but these errors were encountered: