First published: Mon Sep 05 2022(Updated: )
A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-snakeyaml | <0:1.33.0-2.SP1_redhat_00001.1.el8ea | 0:1.33.0-2.SP1_redhat_00001.1.el8ea |
redhat/eap7-snakeyaml | <0:1.33.0-2.SP1_redhat_00001.1.el9ea | 0:1.33.0-2.SP1_redhat_00001.1.el9ea |
redhat/eap7-snakeyaml | <0:1.33.0-2.SP1_redhat_00001.1.el7ea | 0:1.33.0-2.SP1_redhat_00001.1.el7ea |
redhat/candlepin | <0:4.2.13-1.el8 | 0:4.2.13-1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el7 | 0:18.0.7-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el8 | 0:18.0.7-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el9 | 0:18.0.7-1.redhat_00001.1.el9 |
Snakeyaml Project Snakeyaml | <1.32 | |
IBM Cloud Transformation Advisor | <=2.0.1 - 3.3.1 | |
maven/org.yaml:snakeyaml | <1.32 | 1.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-38752 is a vulnerability in the snakeyaml package that allows for a denial of service attack by exploiting a stack-overflow in parsing YAML files.
CVE-2022-38752 has a severity value of 6.5 (medium).
The versions affected by CVE-2022-38752 include eap7-snakeyaml 1.33.0-2.SP1_redhat_00001.1.el8ea, eap7-snakeyaml 1.33.0-2.SP1_redhat_00001.1.el9ea, eap7-snakeyaml 1.33.0-2.SP1_redhat_00001.1.el7ea, candlepin 4.2.13-1.el8, rh-sso7-keycloak 18.0.7-1.redhat_00001.1.el7, rh-sso7-keycloak 18.0.7-1.redhat_00001.1.el8, rh-sso7-keycloak 18.0.7-1.redhat_00001.1.el9, Snakeyaml Project Snakeyaml 1.32, IBM Cloud Pak for Business Automation V22.0.2 - V22.0.2-IF001, IBM Cloud Pak for Business Automation V21.0.3 - V21.0.3-IF017, and IBM Cloud Pak for Business Automation V22.0.1 - V22.0.1-IF006 and later fixes, V21.0.2 - V21.0.2-IF012 and later fixes, V21.0.1 - V21.0.1-IF007 and later fixes, V20.0.1 - V20.0.3 and later fixes, V19.0.1 - V19.0.3 and later fixes, V18.0.0 - V18.0.2 and later fixes.
To fix CVE-2022-38752, update to the recommended versions: eap7-snakeyaml 1.33.0-2.SP1_redhat_00001.1.el8ea, eap7-snakeyaml 1.33.0-2.SP1_redhat_00001.1.el9ea, eap7-snakeyaml 1.33.0-2.SP1_redhat_00001.1.el7ea, candlepin 4.2.13-1.el8, rh-sso7-keycloak 18.0.7-1.redhat_00001.1.el7, rh-sso7-keycloak 18.0.7-1.redhat_00001.1.el8, rh-sso7-keycloak 18.0.7-1.redhat_00001.1.el9, or follow the provided patches for IBM Cloud Pak for Business Automation versions.
The Common Weakness Enumeration (CWE) for CVE-2022-38752 includes CWE-787 (Out-of-bounds Write) and CWE-121 (Stack-based Buffer Overflow).