First published: Fri Nov 11 2022(Updated: )
snakeYAML is vulnerable to a denial of service, caused by improper input validation. By persuading a victim to open a specially-crafted YAML content, a remote attacker could exploit this vulnerability to cause a denial of service condition.
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-snakeyaml | <0:1.33.0-2.SP1_redhat_00001.1.el8ea | 0:1.33.0-2.SP1_redhat_00001.1.el8ea |
redhat/eap7-snakeyaml | <0:1.33.0-2.SP1_redhat_00001.1.el9ea | 0:1.33.0-2.SP1_redhat_00001.1.el9ea |
redhat/eap7-snakeyaml | <0:1.33.0-2.SP1_redhat_00001.1.el7ea | 0:1.33.0-2.SP1_redhat_00001.1.el7ea |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el7 | 0:18.0.7-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el8 | 0:18.0.7-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el9 | 0:18.0.7-1.redhat_00001.1.el9 |
Snakeyaml Project Snakeyaml | <1.32 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
IBM Cognos Analytics | <=12.0.0-12.0.1 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP2 | |
IBM Cognos Analytics | <=11.1.1-11.1.7 FP7 | |
redhat/snakeyaml | <1.32 | 1.32 |
maven/org.yaml:snakeyaml | <1.32 | 1.32 |
<1.32 | ||
=36 | ||
=37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-41854 is a vulnerability in snakeYAML that allows for a denial of service attack through improper input validation.
The severity of CVE-2022-41854 is medium, with a CVSS score of 6.5.
Snakeyaml users who parse untrusted YAML files may be vulnerable to denial of service attacks.
To fix the CVE-2022-41854 vulnerability, users should update to snakeYAML version 1.33.0 or later.
Yes, you can find more information about CVE-2022-41854 in the following references: [link1](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355) and [link2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2152478).