vulnerability
Debian: CVE-2022-41854: snakeyaml -- security update
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:H/Au:S/C:N/I:N/A:C) | Nov 11, 2022 | Jul 30, 2024 | Mar 30, 2026 |
Severity
5
CVSS
(AV:N/AC:H/Au:S/C:N/I:N/A:C)
Published
Nov 11, 2022
Added
Jul 30, 2024
Modified
Mar 30, 2026
Description
Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
Solution
debian-upgrade-snakeyaml
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.