First published: Fri Nov 11 2022(Updated: )
snakeYAML is vulnerable to a denial of service, caused by improper input validation. By persuading a victim to open a specially-crafted YAML content, a remote attacker could exploit this vulnerability to cause a denial of service condition.
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-snakeyaml | <0:1.33.0-2.SP1_redhat_00001.1.el8ea | 0:1.33.0-2.SP1_redhat_00001.1.el8ea |
redhat/eap7-snakeyaml | <0:1.33.0-2.SP1_redhat_00001.1.el9ea | 0:1.33.0-2.SP1_redhat_00001.1.el9ea |
redhat/eap7-snakeyaml | <0:1.33.0-2.SP1_redhat_00001.1.el7ea | 0:1.33.0-2.SP1_redhat_00001.1.el7ea |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el7 | 0:18.0.7-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el8 | 0:18.0.7-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el9 | 0:18.0.7-1.redhat_00001.1.el9 |
redhat/snakeyaml | <1.32 | 1.32 |
maven/org.yaml:snakeyaml | <1.32 | 1.32 |
Snakeyaml | <1.32 | |
Fedora | =36 | |
Fedora | =37 | |
IBM Cloud Pak for Business Automation | <=V22.0.2 - V22.0.2-IF001 | |
IBM Cloud Pak for Business Automation | <=V21.0.3 - V21.0.3-IF017 | |
IBM Cloud Pak for Business Automation | <=V22.0.1 - V22.0.1-IF006 and later fixes V21.0.2 - V21.0.2-IF012 and later fixesV21.0.1 - V21.0.1-IF007 and later fixesV20.0.1 - V20.0.3 and later fixesV19.0.1 - V19.0.3 and later fixesV18.0.0 - V18.0.2 and later fixes |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-41854 is a vulnerability in snakeYAML that allows for a denial of service attack through improper input validation.
The severity of CVE-2022-41854 is medium, with a CVSS score of 6.5.
Snakeyaml users who parse untrusted YAML files may be vulnerable to denial of service attacks.
To fix the CVE-2022-41854 vulnerability, users should update to snakeYAML version 1.33.0 or later.
Yes, you can find more information about CVE-2022-41854 in the following references: [link1](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355) and [link2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2152478).