Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Redhat
Subscribe
|
Amq Clients
Subscribe
Camel Spring Boot
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Jboss Fuse
Subscribe
Migration Toolkit Applications
Subscribe
Migration Toolkit Runtimes
Subscribe
Ocp Tools
Subscribe
Openshift Application Runtimes
Subscribe
Red Hat Single Sign On
Subscribe
Rhosemc
Subscribe
|
|
Snakeyaml Project
Subscribe
|
Snakeyaml
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7446 | Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack. |
Github GHSA |
GHSA-w37g-rhq8-7m4j | Snakeyaml vulnerable to Stack overflow leading to denial of service |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-09-16T16:24:11.627Z
Reserved: 2022-09-30T00:00:00
Link: CVE-2022-41854
No data.
Status : Modified
Published: 2022-11-11T13:15:11.003
Modified: 2024-11-21T07:23:56.797
Link: CVE-2022-41854
OpenCVE Enrichment
No data.
EUVD
Github GHSA