Lucene search

K
debianDebianDEBIAN:DLA-3132-1:1B1EA
HistoryOct 02, 2022 - 10:06 p.m.

[SECURITY] [DLA 3132-1] snakeyaml security update

2022-10-0222:06:40
lists.debian.org
20
snakeyaml
debian 10 buster
cve-2022-25857
cve-2022-38749
cve-2022-38750
cve-2022-38751
denial of service
security update
java
yaml parser

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.9

Confidence

High

EPSS

0.002

Percentile

55.6%


Debian LTS Advisory DLA-3132-1 [email protected]
https://www.debian.org/lts/security/ Markus Koschany
October 03, 2022 https://wiki.debian.org/LTS

Package : snakeyaml
Version : 1.23-1+deb10u1
CVE ID : CVE-2022-25857 CVE-2022-38749 CVE-2022-38750 CVE-2022-38751
Debian Bug : 1019218

Several security vulnerabilities have been discovered in SnakeYaml, a YAML
parser for Java, which could facilitate a denial of service attack whenever
maliciously crafted input files are processed by SnakeYaml.

For Debian 10 buster, these problems have been fixed in version
1.23-1+deb10u1.

We recommend that you upgrade your snakeyaml packages.

For the detailed security status of snakeyaml please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/snakeyaml

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.9

Confidence

High

EPSS

0.002

Percentile

55.6%