Hide Forgot
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47027
Created liblouisutdml tracking bugs for this issue: Affects: fedora-all [bug 2130428] Created picocli tracking bugs for this issue: Affects: fedora-all [bug 2130429] Created snakeyaml tracking bugs for this issue: Affects: epel-all [bug 2130427] Affects: fedora-all [bug 2130430] Created texlive-base tracking bugs for this issue: Affects: fedora-all [bug 2130431]
This issue has been addressed in the following products: Red Hat build of Eclipse Vert.x 4.3.3 Via RHSA-2022:6757 https://access.redhat.com/errata/RHSA-2022:6757
This issue has been addressed in the following products: Red Hat Data Grid 8.4.0 Via RHSA-2022:8524 https://access.redhat.com/errata/RHSA-2022:8524
This issue has been addressed in the following products: Red Hat JBoss AMQ Via RHSA-2022:8876 https://access.redhat.com/errata/RHSA-2022:8876
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-38750