Description
Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7446 | Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack. |
Github GHSA |
GHSA-w37g-rhq8-7m4j | Snakeyaml vulnerable to Stack overflow leading to denial of service |
References
History
No history.
Subscriptions
Fedoraproject
Subscribe
Fedora
Subscribe
Redhat
Subscribe
Amq Clients
Subscribe
Camel Spring Boot
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Jboss Fuse
Subscribe
Migration Toolkit Applications
Subscribe
Migration Toolkit Runtimes
Subscribe
Ocp Tools
Subscribe
Openshift Application Runtimes
Subscribe
Red Hat Single Sign On
Subscribe
Rhosemc
Subscribe
Snakeyaml Project
Subscribe
Snakeyaml
Subscribe
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-09-16T16:24:11.627Z
Reserved: 2022-09-30T00:00:00.000Z
Link: CVE-2022-41854
No data.
Status : Modified
Published: 2022-11-11T13:15:11.003
Modified: 2024-11-21T07:23:56.797
Link: CVE-2022-41854
OpenCVE Enrichment
No data.
EUVD
Github GHSA