Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-7446 | Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack. |
![]() |
GHSA-w37g-rhq8-7m4j | Snakeyaml vulnerable to Stack overflow leading to denial of service |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-09-16T16:24:11.627Z
Reserved: 2022-09-30T00:00:00
Link: CVE-2022-41854

No data.

Status : Modified
Published: 2022-11-11T13:15:11.003
Modified: 2024-11-21T07:23:56.797
Link: CVE-2022-41854


No data.