Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3132-1 | snakeyaml security update |
EUVD |
EUVD-2022-6753 | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. |
Github GHSA |
GHSA-98wm-3w3q-mw94 | snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write |
Ubuntu USN |
USN-5944-1 | SnakeYAML vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 21 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-04-21T13:50:22.367Z
Reserved: 2022-08-25T00:00:00.000Z
Link: CVE-2022-38751
Updated: 2024-08-03T11:02:14.576Z
Status : Modified
Published: 2022-09-05T10:15:09.793
Modified: 2024-11-21T07:17:01.357
Link: CVE-2022-38751
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN