Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:3397-1

Опубликовано: 26 сент. 2022
Источник: suse-cvrf

Описание

Security update for snakeyaml

This update for snakeyaml fixes the following issues:

  • CVE-2022-38750: Fixed uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject (bsc#1203158).
  • CVE-2022-38749: Fixed StackOverflowError for many open unmatched brackets (bsc#1203149).
  • CVE-2022-38752: Fixed uncaught exception in java.base/java.util.ArrayList.hashCode (bsc#1203154).
  • CVE-2022-38751: Fixed unrestricted data matched with Regular Expressions (bsc#1203153).
  • CVE-2022-25857: Fixed denial of service vulnerability due missing to nested depth limitation for collections (bsc#1202932).

Список пакетов

Container containers/apache-pulsar:3.3
snakeyaml-1.31-150200.3.8.1
Container suse/manager/5.0/x86_64/server:latest
snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure
snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM
snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE
snakeyaml-1.31-150200.3.8.1
Image SLES15-SP4-Manager-Server-4-3
snakeyaml-1.31-150200.3.8.1
Image SLES15-SP4-Manager-Server-4-3-Azure-llc
snakeyaml-1.31-150200.3.8.1
Image SLES15-SP4-Manager-Server-4-3-Azure-ltd
snakeyaml-1.31-150200.3.8.1
Image SLES15-SP4-Manager-Server-4-3-BYOS
snakeyaml-1.31-150200.3.8.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
snakeyaml-1.31-150200.3.8.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
snakeyaml-1.31-150200.3.8.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
snakeyaml-1.31-150200.3.8.1
Image SLES15-SP4-Manager-Server-4-3-EC2-llc
snakeyaml-1.31-150200.3.8.1
Image SLES15-SP4-Manager-Server-4-3-EC2-ltd
snakeyaml-1.31-150200.3.8.1
Image server-image
snakeyaml-1.31-150200.3.8.1
SUSE Linux Enterprise Module for Development Tools 15 SP3
snakeyaml-1.31-150200.3.8.1
SUSE Linux Enterprise Module for Development Tools 15 SP4
snakeyaml-1.31-150200.3.8.1
SUSE Manager Server Module 4.2
snakeyaml-1.31-150200.3.8.1
SUSE Manager Server Module 4.3
snakeyaml-1.31-150200.3.8.1
openSUSE Leap 15.3
snakeyaml-1.31-150200.3.8.1
snakeyaml-javadoc-1.31-150200.3.8.1
openSUSE Leap 15.4
snakeyaml-1.31-150200.3.8.1
snakeyaml-javadoc-1.31-150200.3.8.1

Описание

An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.


Затронутые продукты
Container containers/apache-pulsar:3.3:snakeyaml-1.31-150200.3.8.1
Container suse/manager/5.0/x86_64/server:latest:snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:snakeyaml-1.31-150200.3.8.1

Ссылки

Описание

The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.


Затронутые продукты
Container containers/apache-pulsar:3.3:snakeyaml-1.31-150200.3.8.1
Container suse/manager/5.0/x86_64/server:latest:snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:snakeyaml-1.31-150200.3.8.1

Ссылки

Описание

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.


Затронутые продукты
Container containers/apache-pulsar:3.3:snakeyaml-1.31-150200.3.8.1
Container suse/manager/5.0/x86_64/server:latest:snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:snakeyaml-1.31-150200.3.8.1

Ссылки

Описание

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.


Затронутые продукты
Container containers/apache-pulsar:3.3:snakeyaml-1.31-150200.3.8.1
Container suse/manager/5.0/x86_64/server:latest:snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:snakeyaml-1.31-150200.3.8.1

Ссылки

Описание

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.


Затронутые продукты
Container containers/apache-pulsar:3.3:snakeyaml-1.31-150200.3.8.1
Container suse/manager/5.0/x86_64/server:latest:snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:snakeyaml-1.31-150200.3.8.1

Ссылки

Описание

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.


Затронутые продукты
Container containers/apache-pulsar:3.3:snakeyaml-1.31-150200.3.8.1
Container suse/manager/5.0/x86_64/server:latest:snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure:snakeyaml-1.31-150200.3.8.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM:snakeyaml-1.31-150200.3.8.1

Ссылки
Уязвимость SUSE-SU-2022:3397-1