First published: Thu Mar 27 2025(Updated: )
It was discovered that SnakeYAML incorrectly handled recursive entity references. An attacker could possibly use this issue to cause SnakeYAML to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libyaml-snake-java | <1.25+ds-2ubuntu0.1+esm1 | 1.25+ds-2ubuntu0.1+esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libyaml-snake-java | <1.23-1+deb10u1ubuntu0.1~esm1 | 1.23-1+deb10u1ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libyaml-snake-java | <1.12-2ubuntu0.16.04.1~esm2 | 1.12-2ubuntu0.16.04.1~esm2 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libyaml-snake-java | <1.12-2ubuntu0.14.04.1~esm2 | 1.12-2ubuntu0.14.04.1~esm2 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7368-1 is classified as a denial of service risk due to improper handling of recursive entity references in SnakeYAML.
To fix USN-7368-1, update to the appropriate version of the libyaml-snake-java package as specified in the advisory for your Ubuntu version.
USN-7368-1 affects Ubuntu versions 20.04, 18.04, 16.04, and 14.04.
The impact of the vulnerability in USN-7368-1 is that an attacker could potentially crash SnakeYAML, leading to a denial of service.
As of now, there is no specific known exploit for USN-7368-1, but the vulnerability poses a risk that could be leveraged by attackers.