First published: Mon Aug 14 2023(Updated: )
Simon Ferquel discovered that the Go yaml package incorrectly handled certain YAML documents. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause the system to crash, resulting in a denial of service. (CVE-2021-4235) It was discovered that the Go yaml package incorrectly handled certain large YAML documents. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause the system to crash, resulting in a denial of service. (CVE-2022-3064)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/golang-gopkg-yaml.v2-dev | <2.2.2-1ubuntu0.1 | 2.2.2-1ubuntu0.1 |
=20.04 | ||
All of | ||
ubuntu/golang-yaml.v2-dev | <2.2.2-1ubuntu0.1 | 2.2.2-1ubuntu0.1 |
=20.04 | ||
All of | ||
ubuntu/golang-gopkg-yaml.v2-dev | <0.0+git20170407.0.cd8b52f-1ubuntu2+esm1 | 0.0+git20170407.0.cd8b52f-1ubuntu2+esm1 |
=18.04 | ||
All of | ||
ubuntu/golang-yaml.v2-dev | <0.0+git20170407.0.cd8b52f-1ubuntu2+esm1 | 0.0+git20170407.0.cd8b52f-1ubuntu2+esm1 |
=18.04 | ||
All of | ||
ubuntu/golang-yaml.v2-dev | <0.0+git20160301.0.a83829b-1ubuntu0.1~esm1 | 0.0+git20160301.0.a83829b-1ubuntu0.1~esm1 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is USN-6287-1.
The severity of USN-6287-1 is not mentioned in the advisory.
The Go yaml vulnerability affects Ubuntu 20.04, 18.04, and 16.04.
The remedy for the Go yaml vulnerability is to update to version 2.2.2-1ubuntu0.1 or later.
You can find more information about the Go yaml vulnerability at the following references: [CVE-2022-3064](https://ubuntu.com/security/CVE-2022-3064) and [CVE-2021-4235](https://ubuntu.com/security/CVE-2021-4235).