First published: Mon Sep 05 2022(Updated: )
A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/candlepin | <0:4.2.13-1.el8 | 0:4.2.13-1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el7 | 0:18.0.6-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el8 | 0:18.0.6-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el9 | 0:18.0.6-1.redhat_00001.1.el9 |
Snakeyaml Project Snakeyaml | <1.31 | |
Debian Debian Linux | =10.0 | |
redhat/snakeyaml | <1.31 | 1.31 |
IBM Cloud Transformation Advisor | <=2.0.1 - 3.3.1 | |
maven/org.yaml:snakeyaml | <1.31 | 1.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-38750 is a vulnerability found in the snakeyaml package that can be exploited to cause a denial of service (DoS) by triggering a stack overflow when parsing YAML files.
CVE-2022-38750 can impact snakeyaml if it is used to parse untrusted YAML files, allowing attackers to crash the parser through a DoS attack.
CVE-2022-38750 has a severity rating of medium, with a severity value of 5.5.
The affected software versions include snakeyaml version up to exclusive 1.31, candlepin version 0:4.2.13-1.el8, rh-sso7-keycloak versions 0:18.0.6-1.redhat_00001.1.el7, 0:18.0.6-1.redhat_00001.1.el8, and 0:18.0.6-1.redhat_00001.1.el9.
To fix CVE-2022-38750, it is recommended to update to snakeyaml version 1.31 or later, or apply the specific remedies provided for candlepin and rh-sso7-keycloak versions.