[BUILD-947] Parsing untrusted YAML files in snakeYAML may be vulnerable to DoS attacks Created: 14/Nov/22  Updated: 24/Nov/22  Resolved: 22/Nov/22

Status: Closed
Project: Build
Component/s: None
Affects Version/s: None
Fix Version/s: None

Type: Task Priority: Neutral
Reporter: Federico Grilli Assignee: Federico Grilli
Resolution: Not an issue Votes: 0
Labels: security
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified

Issue Links:
relation
Template:
Acceptance criteria:
Empty
Task DoR:
Empty
Team: Foundation

 Description   
snakeyaml-1.33.jar (pkg:maven/org.yaml/snakeyaml@1.33, cpe:2.3:a:snakeyaml_project:snakeyaml:1.33:*:*:*:*:*:*:*, cpe:2.3:a:yaml_project:yaml:1.33:*:*:*:*:*:*:*) : CVE-2022-41854

https://nvd.nist.gov/vuln/detail/CVE-2022-41854

Undergoing analysis at the time of ticket creation. CVE will be temporarily suppressed.

Not a security issue: snakeYaml 1.33 is not affected. 


Generated at Sun Feb 11 23:46:42 CET 2024 using Jira 9.4.2#940002-sha1:46d1a51de284217efdcb32434eab47a99af2938b.