CVE-2022-41854

CVSS v3.1 6.5 (Medium)
65% Progress
EPSS 0.71 % (81th)
0.71% Progress
Affected Products 2
Advisories 4
NVD Status Modified

Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.

Weaknesses
CWE-121
Stack-based Buffer Overflow
CWE-787
Out-of-bounds Write
CVE Status
PUBLISHED
NVD Status
Modified
CNA
Google Inc.
Published Date
2022-11-11 13:15:11
(22 months ago)
Updated Date
2024-06-21 19:15:24
(2 months ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Snakeyaml Project Snakeyaml prior 1.32 version cpe:2.3:a:snakeyaml_project:snakeyaml < 1.32

Configuration #2

    CPE23 From Up To
  Fedoraproject Fedora 36 cpe:2.3:o:fedoraproject:fedora:36
  Fedoraproject Fedora 37 cpe:2.3:o:fedoraproject:fedora:37
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...