DEBIAN-CVE-2022-38751

Source
https://security-tracker.debian.org/tracker/CVE-2022-38751
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-38751.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-38751
Upstream
Published
2022-09-05T10:15:09Z
Modified
2025-09-25T23:27:45.378546Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

References

Affected packages

Debian:11 / snakeyaml

Package

Name
snakeyaml
Purl
pkg:deb/debian/snakeyaml?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.28-1+deb11u1

Affected versions

1.*

1.28-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / snakeyaml

Package

Name
snakeyaml
Purl
pkg:deb/debian/snakeyaml?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.31-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / snakeyaml

Package

Name
snakeyaml
Purl
pkg:deb/debian/snakeyaml?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.31-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / snakeyaml

Package

Name
snakeyaml
Purl
pkg:deb/debian/snakeyaml?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.31-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}