Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Snakeyaml | Snakeyaml_project | * | 1.32 (excluding) |
EAP 7.4.10 release | RedHat | snakeyaml | * |
Red Hat AMQ Streams 2.3.0 | RedHat | snakeyaml | * |
Red Hat build of Eclipse Vert.x 4.3.3 | RedHat | snakeyaml | * |
Red Hat Data Grid 8.4.0 | RedHat | snakeyaml | * |
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 | RedHat | eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap | * |
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9 | RedHat | eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap | * |
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 | RedHat | eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap | * |
Red Hat Satellite 6.13 for RHEL 8 | RedHat | candlepin-0:4.2.13-1.el8sat | * |
Red Hat Single Sign-On 7 | RedHat | snakeyaml | * |
Red Hat Single Sign-On 7.6 for RHEL 7 | RedHat | rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso | * |
Red Hat Single Sign-On 7.6 for RHEL 8 | RedHat | rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso | * |
Red Hat Single Sign-On 7.6 for RHEL 9 | RedHat | rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso | * |
RHEL-8 based Middleware Containers | RedHat | rh-sso-7/sso76-openshift-rhel8:7.6-22 | * |
RHINT Camel-Springboot 3.18.3.P2 | RedHat | snakeyaml | * |
RHINT Camel-Springboot 3.20.1 | RedHat | snakeyaml | * |
Snakeyaml | Ubuntu | bionic | * |
Snakeyaml | Ubuntu | kinetic | * |
Snakeyaml | Ubuntu | lunar | * |
Snakeyaml | Ubuntu | mantic | * |
Snakeyaml | Ubuntu | trusty | * |
Snakeyaml | Ubuntu | trusty/esm | * |
Snakeyaml | Ubuntu | xenial | * |