Description
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6769 | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow. |
Github GHSA |
GHSA-9w3m-gqgf-c4p9 | snakeYAML before 1.32 vulnerable to Denial of Service due to Out-of-bounds Write |
References
History
No history.
Subscriptions
Redhat
Subscribe
Amq Streams
Subscribe
Camel Spring Boot
Subscribe
Jboss Data Grid
Subscribe
Jboss Enterprise Application Platform
Subscribe
Openshift Application Runtimes
Subscribe
Red Hat Single Sign On
Subscribe
Rhosemc
Subscribe
Satellite
Subscribe
Snakeyaml Project
Subscribe
Snakeyaml
Subscribe
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-03T11:02:14.529Z
Reserved: 2022-08-25T00:00:00.000Z
Link: CVE-2022-38752
Updated: 2024-08-03T11:02:14.529Z
Status : Modified
Published: 2022-09-05T10:15:09.847
Modified: 2024-11-21T07:17:01.483
Link: CVE-2022-38752
OpenCVE Enrichment
No data.
EUVD
Github GHSA