CVE-2022-38751

NameCVE-2022-38751
DescriptionUsing snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3132-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
snakeyaml (PTS)buster1.23-1vulnerable
buster (security)1.23-1+deb10u1fixed
bullseye1.28-1vulnerable
bookworm1.29-1vulnerable
sid1.33-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
snakeyamlsourcebuster1.23-1+deb10u1DLA-3132-1
snakeyamlsource(unstable)1.31-1

Notes

[bullseye] - snakeyaml <no-dsa> (Minor issue)
https://bitbucket.org/snakeyaml/snakeyaml/issues/530/stackoverflow-oss-fuzz-47039
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47039
Fixed by https://bitbucket.org/snakeyaml/snakeyaml/commits/f3ab4e0f54c37ddb10f00b71d04187bb0ef1799c
Fixed by https://bitbucket.org/snakeyaml/snakeyaml/commits/6aedd33a811f7347c5dae2940e75940966f59466

Search for package or bug name: Reporting problems