Bug 2129709 (CVE-2022-38751) - CVE-2022-38751 snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match
Summary: CVE-2022-38751 snakeyaml: Uncaught exception in java.base/java.util.regex.Pat...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-38751
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2130437 2130438 2130440 2130441 2132667 2132668 2132669 2132670 2130436 2130439 2130442 2130469 2132671
Blocks: 2124261
TreeView+ depends on / blocked
 
Reported: 2022-09-26 06:02 UTC by Sandipan Roy
Modified: 2022-12-09 19:32 UTC (History)
105 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-12-09 19:32:49 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:6757 0 None None None 2022-10-05 14:50:57 UTC
Red Hat Product Errata RHSA-2022:8524 0 None None None 2022-11-17 13:40:37 UTC
Red Hat Product Errata RHSA-2022:8876 0 None None None 2022-12-07 08:20:00 UTC

Description Sandipan Roy 2022-09-26 06:02:47 UTC
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

https://bitbucket.org/snakeyaml/snakeyaml/issues/530/stackoverflow-oss-fuzz-47039
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47039

Comment 2 Sandipan Roy 2022-09-28 07:29:07 UTC
Created liblouisutdml tracking bugs for this issue:

Affects: fedora-all [bug 2130437]


Created picocli tracking bugs for this issue:

Affects: fedora-all [bug 2130438]


Created snakeyaml tracking bugs for this issue:

Affects: epel-all [bug 2130436]
Affects: fedora-all [bug 2130439]


Created texlive-base tracking bugs for this issue:

Affects: fedora-all [bug 2130440]

Comment 5 errata-xmlrpc 2022-10-05 14:50:52 UTC
This issue has been addressed in the following products:

  Red Hat build of Eclipse Vert.x 4.3.3

Via RHSA-2022:6757 https://access.redhat.com/errata/RHSA-2022:6757

Comment 14 errata-xmlrpc 2022-11-17 13:40:33 UTC
This issue has been addressed in the following products:

  Red Hat Data Grid 8.4.0

Via RHSA-2022:8524 https://access.redhat.com/errata/RHSA-2022:8524

Comment 15 errata-xmlrpc 2022-12-07 08:19:56 UTC
This issue has been addressed in the following products:

  Red Hat JBoss AMQ

Via RHSA-2022:8876 https://access.redhat.com/errata/RHSA-2022:8876

Comment 16 Product Security DevOps Team 2022-12-09 19:32:44 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-38751


Note You need to log in before you can comment on or make changes to this bug.