Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3132-1 | snakeyaml security update |
EUVD |
EUVD-2022-6773 | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. |
Github GHSA |
GHSA-c4r9-r8fh-9vj2 | snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write |
Ubuntu USN |
USN-5944-1 | SnakeYAML vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-03T11:02:14.586Z
Reserved: 2022-08-25T00:00:00
Link: CVE-2022-38749
No data.
Status : Modified
Published: 2022-09-05T10:15:09.673
Modified: 2024-11-21T07:17:01.060
Link: CVE-2022-38749
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN