First published: Mon Sep 05 2022(Updated: )
A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash, resulting in a denial of service.
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/candlepin | <0:4.2.13-1.el8 | 0:4.2.13-1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el7 | 0:18.0.6-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el8 | 0:18.0.6-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el9 | 0:18.0.6-1.redhat_00001.1.el9 |
Snakeyaml Project Snakeyaml | <1.31 | |
Debian Debian Linux | =10.0 | |
redhat/snakeyaml | <1.31.0 | 1.31.0 |
IBM Cloud Transformation Advisor | <=2.0.1 - 3.3.1 | |
maven/pl.droidsonroids.yaml:snakeyaml | <=1.18.2 | |
maven/org.testifyproject.external:external-snakeyaml | <=1.0.6 | |
maven/io.prometheus.jmx:jmx_prometheus_httpserver_java6 | <=0.18.0 | |
maven/io.prometheus.jmx:jmx_prometheus_httpserver | =0.17.0 | |
maven/com.alipay.sofa.acts:acts-common-util | =1.0.0 | |
maven/be.cylab:snakeyaml | =1.25.1 | |
maven/org.yaml:snakeyaml | <1.31 | 1.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-38749 is a vulnerability in the snakeyaml package that allows for Denial of Service (DOS) attacks through the parsing of specially-crafted YAML files.
CVE-2022-38749 has a severity rating of 6.5 out of 10, making it a medium severity vulnerability.
Versions up to but not including 1.31.0 of the snakeyaml package are affected by CVE-2022-38749.
To fix CVE-2022-38749, you should update your snakeyaml package to version 1.31.0 or later.
You can find more information about CVE-2022-38749 on the CVE website (https://www.cve.org/CVERecord?id=CVE-2022-38749) and the NIST National Vulnerability Database (https://nvd.nist.gov/vuln/detail/CVE-2022-38749).