Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3132-1 | snakeyaml security update |
EUVD |
EUVD-2022-6839 | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. |
Github GHSA |
GHSA-hhhw-99gj-p3c3 | snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write |
Ubuntu USN |
USN-5944-1 | SnakeYAML vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 20 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-11-20T14:57:41.651Z
Reserved: 2022-08-25T00:00:00
Link: CVE-2022-38750
Updated: 2024-08-03T11:02:14.509Z
Status : Modified
Published: 2022-09-05T10:15:09.733
Modified: 2024-11-21T07:17:01.207
Link: CVE-2022-38750
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN