Description
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3132-1 | snakeyaml security update |
EUVD |
EUVD-2022-6773 | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. |
Github GHSA |
GHSA-c4r9-r8fh-9vj2 | snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write |
Ubuntu USN |
USN-5944-1 | SnakeYAML vulnerabilities |
References
History
No history.
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
Redhat
Subscribe
Amq Broker
Subscribe
Amq Clients
Subscribe
Camel Spring Boot
Subscribe
Jboss Data Grid
Subscribe
Jboss Fuse
Subscribe
Openshift Application Runtimes
Subscribe
Red Hat Single Sign On
Subscribe
Rhosemc
Subscribe
Satellite
Subscribe
Snakeyaml Project
Subscribe
Snakeyaml
Subscribe
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-03T11:02:14.586Z
Reserved: 2022-08-25T00:00:00.000Z
Link: CVE-2022-38749
No data.
Status : Modified
Published: 2022-09-05T10:15:09.673
Modified: 2024-11-21T07:17:01.060
Link: CVE-2022-38749
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN