First published: Mon Sep 26 2022(Updated: )
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow. <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47081">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47081</a> <a href="https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081">https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081</a>
Affected Software | Affected Version | How to fix |
---|---|---|
SnakeYaml |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2129710 is classified as critical due to its potential for Denial of Service attacks.
To fix REDHAT-BUG-2129710, upgrade to the latest version of SnakeYAML that addresses this vulnerability.
REDHAT-BUG-2129710 is associated with stack overflow vulnerabilities in SnakeYAML when parsing untrusted YAML files.
Users of SnakeYAML who parse untrusted YAML files are affected by REDHAT-BUG-2129710.
The potential impacts of REDHAT-BUG-2129710 include crashes and service outages due to Denial of Service conditions.