Description
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3479-1 | golang-yaml.v2 security update |
EUVD |
EUVD-2022-7537 | Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory. |
Github GHSA |
GHSA-6q6q-88xp-6f2r | yaml package for Go can consume excessive amounts of CPU or memory |
Ubuntu USN |
USN-6287-1 | Go yaml vulnerabilities |
References
History
Mon, 14 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2025-04-14T17:05:01.917Z
Reserved: 2022-08-30T15:40:50.104Z
Link: CVE-2022-3064
Updated: 2024-08-03T01:00:10.262Z
Status : Modified
Published: 2022-12-27T22:15:14.507
Modified: 2025-04-14T17:15:25.407
Link: CVE-2022-3064
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN