Revision Date: | 2023-06-22 | Version: | 1 |
Title: | CVE-2022-38750 |
Description: |
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
|
Family: | unix | Class: | vulnerability |
Status: | | Reference(s): | Mitre CVE-2022-38750 SUSE CVE-2022-38750 SUSE-SU-2022:3397-1 SUSE-SU-2022:3560-1
|
Platform(s): | SUSE Linux Enterprise Desktop 15 SP5 SUSE Linux Enterprise High Performance Computing 15 SP5 SUSE Linux Enterprise Module for Development Tools 15 SP5 SUSE Linux Enterprise Server 15 SP5 SUSE Linux Enterprise Server for SAP Applications 15 SP5
| Product(s): | |
Definition Synopsis |
Release Information SUSE Linux Enterprise Desktop 15 SP5 is installed
OR SUSE Linux Enterprise High Performance Computing 15 SP5 is installed
OR SUSE Linux Enterprise Module for Development Tools 15 SP5 is installed
OR SUSE Linux Enterprise Server 15 SP5 is installed
OR SUSE Linux Enterprise Server for SAP Applications 15 SP5 is installed
AND snakeyaml-1.33-150200.3.12.4 is installed
|