Описание
YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified
A flaw was found in yaml-libyaml. The component uses a two-argument open
function when parsing YAML files, which allows an attacker to modify existing files on the system. This flaw allows a local attacker to provide a crafted YAML file as input. This issue can result in unauthorized modification of files.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 8 | perl-YAML-LibYAML | Affected | ||
Red Hat Enterprise Linux 9 | perl-YAML-LibYAML | Affected |
Показывать по
Дополнительная информация
Статус:
EPSS
7.7 High
CVSS3
Связанные уязвимости
YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified
YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified
YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing exis ...
EPSS
7.7 High
CVSS3