CWE
787 121
Advisory Published
Advisory Published
Updated

CVE-2022-38752: DoS in SnakeYAML

First published: Mon Sep 05 2022(Updated: )

A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.

Credit: cve-coordination@google.com cve-coordination@google.com

Affected SoftwareAffected VersionHow to fix
redhat/eap7-snakeyaml<0:1.33.0-2.SP1_redhat_00001.1.el8ea
0:1.33.0-2.SP1_redhat_00001.1.el8ea
redhat/eap7-snakeyaml<0:1.33.0-2.SP1_redhat_00001.1.el9ea
0:1.33.0-2.SP1_redhat_00001.1.el9ea
redhat/eap7-snakeyaml<0:1.33.0-2.SP1_redhat_00001.1.el7ea
0:1.33.0-2.SP1_redhat_00001.1.el7ea
redhat/candlepin<0:4.2.13-1.el8
0:4.2.13-1.el8
redhat/rh-sso7-keycloak<0:18.0.7-1.redhat_00001.1.el7
0:18.0.7-1.redhat_00001.1.el7
redhat/rh-sso7-keycloak<0:18.0.7-1.redhat_00001.1.el8
0:18.0.7-1.redhat_00001.1.el8
redhat/rh-sso7-keycloak<0:18.0.7-1.redhat_00001.1.el9
0:18.0.7-1.redhat_00001.1.el9
Snakeyaml Project Snakeyaml<1.32
IBM Cloud Transformation Advisor<=2.0.1 - 3.3.1
maven/org.yaml:snakeyaml<1.32
1.32

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is CVE-2022-38752?

    CVE-2022-38752 is a vulnerability in the snakeyaml package that allows for a denial of service attack by exploiting a stack-overflow in parsing YAML files.

  • How severe is CVE-2022-38752?

    CVE-2022-38752 has a severity value of 6.5 (medium).

  • Which software versions are affected by CVE-2022-38752?

    The versions affected by CVE-2022-38752 include eap7-snakeyaml 1.33.0-2.SP1_redhat_00001.1.el8ea, eap7-snakeyaml 1.33.0-2.SP1_redhat_00001.1.el9ea, eap7-snakeyaml 1.33.0-2.SP1_redhat_00001.1.el7ea, candlepin 4.2.13-1.el8, rh-sso7-keycloak 18.0.7-1.redhat_00001.1.el7, rh-sso7-keycloak 18.0.7-1.redhat_00001.1.el8, rh-sso7-keycloak 18.0.7-1.redhat_00001.1.el9, Snakeyaml Project Snakeyaml 1.32, IBM Cloud Pak for Business Automation V22.0.2 - V22.0.2-IF001, IBM Cloud Pak for Business Automation V21.0.3 - V21.0.3-IF017, and IBM Cloud Pak for Business Automation V22.0.1 - V22.0.1-IF006 and later fixes, V21.0.2 - V21.0.2-IF012 and later fixes, V21.0.1 - V21.0.1-IF007 and later fixes, V20.0.1 - V20.0.3 and later fixes, V19.0.1 - V19.0.3 and later fixes, V18.0.0 - V18.0.2 and later fixes.

  • How can I fix CVE-2022-38752?

    To fix CVE-2022-38752, update to the recommended versions: eap7-snakeyaml 1.33.0-2.SP1_redhat_00001.1.el8ea, eap7-snakeyaml 1.33.0-2.SP1_redhat_00001.1.el9ea, eap7-snakeyaml 1.33.0-2.SP1_redhat_00001.1.el7ea, candlepin 4.2.13-1.el8, rh-sso7-keycloak 18.0.7-1.redhat_00001.1.el7, rh-sso7-keycloak 18.0.7-1.redhat_00001.1.el8, rh-sso7-keycloak 18.0.7-1.redhat_00001.1.el9, or follow the provided patches for IBM Cloud Pak for Business Automation versions.

  • What is the Common Weakness Enumeration (CWE) for CVE-2022-38752?

    The Common Weakness Enumeration (CWE) for CVE-2022-38752 includes CWE-787 (Out-of-bounds Write) and CWE-121 (Stack-based Buffer Overflow).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203