Upstream information

CVE-2022-38752 at MITRE

Description

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 6.5 7.5
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network Network
Attack Complexity Low Low
Privileges Required Low None
User Interaction None None
Scope Unchanged Unchanged
Confidentiality Impact None None
Integrity Impact None None
Availability Impact High High
CVSSv3 Version 3.1 3.1
SUSE Bugzilla entry: 1203154 [NEW]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE
Image SLES15-SP4-Manager-Server-4-3-BYOS
Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
  • snakeyaml >= 1.31-150200.3.8.1
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise Desktop 15 SP3
SUSE Linux Enterprise High Performance Computing 15 SP3
SUSE Linux Enterprise Module for Development Tools 15 SP3
SUSE Linux Enterprise Server 15 SP3
SUSE Linux Enterprise Server for SAP Applications 15 SP3
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
  • snakeyaml >= 1.31-150200.3.8.1
Patchnames:
SUSE-SLE-Module-Development-Tools-15-SP3-2022-3397
SUSE Linux Enterprise Desktop 15 SP4
SUSE Linux Enterprise High Performance Computing 15 SP4
SUSE Linux Enterprise Module for Development Tools 15 SP4
SUSE Linux Enterprise Server 15 SP4
SUSE Linux Enterprise Server for SAP Applications 15 SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
  • snakeyaml >= 1.31-150200.3.8.1
Patchnames:
SUSE-SLE-Module-Development-Tools-15-SP4-2022-3397
SUSE Linux Enterprise Module for SUSE Manager Server 4.1
SUSE Manager Server 4.1
  • snakeyaml >= 1.31-150200.12.6.1
Patchnames:
SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-3560
SUSE Linux Enterprise Module for SUSE Manager Server 4.2
  • snakeyaml >= 1.31-150200.3.8.1
Patchnames:
SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-3397
SUSE Linux Enterprise Module for SUSE Manager Server 4.3
  • snakeyaml >= 1.31-150200.3.8.1
Patchnames:
SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3397
SUSE Manager Server 4.2
  • snakeyaml >= 1.31-150200.3.8.1
Patchnames:
SUSE-SLE-Module-Development-Tools-15-SP3-2022-3397
SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-3397
SUSE Manager Server 4.3
  • snakeyaml >= 1.31-150200.3.8.1
Patchnames:
SUSE-SLE-Module-Development-Tools-15-SP4-2022-3397
SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3397
openSUSE Leap 15.3
  • snakeyaml >= 1.31-150200.3.8.1
  • snakeyaml-javadoc >= 1.31-150200.3.8.1
Patchnames:
openSUSE-SLE-15.3-2022-3397
openSUSE Leap 15.4
  • snakeyaml >= 1.31-150200.3.8.1
  • snakeyaml-javadoc >= 1.31-150200.3.8.1
Patchnames:
openSUSE-SLE-15.4-2022-3397
openSUSE Tumbleweed
  • snakeyaml >= 1.31-1.1
  • snakeyaml-javadoc >= 1.31-1.1
Patchnames:
openSUSE Tumbleweed GA snakeyaml-1.31-1.1


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
SUSE Enterprise Storage 7 snakeyaml Affected
SUSE Enterprise Storage 7.1 snakeyaml Released
SUSE Linux Enterprise Desktop 15 SP2 snakeyaml Affected
SUSE Linux Enterprise Desktop 15 SP3 snakeyaml Released
SUSE Linux Enterprise Desktop 15 SP4 snakeyaml Released
SUSE Linux Enterprise High Performance Computing 15 SP2 snakeyaml Affected
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS snakeyaml Affected
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS snakeyaml Affected
SUSE Linux Enterprise High Performance Computing 15 SP3 snakeyaml Released
SUSE Linux Enterprise High Performance Computing 15 SP4 snakeyaml Released
SUSE Linux Enterprise Module for Development Tools 15 SP2 snakeyaml Affected
SUSE Linux Enterprise Module for Development Tools 15 SP3 snakeyaml Released
SUSE Linux Enterprise Module for Development Tools 15 SP4 snakeyaml Released
SUSE Linux Enterprise Module for SUSE Manager Server 4.1 snakeyaml Released
SUSE Linux Enterprise Module for SUSE Manager Server 4.2 snakeyaml Released
SUSE Linux Enterprise Module for SUSE Manager Server 4.3 snakeyaml Released
SUSE Linux Enterprise Real Time 15 SP2 snakeyaml Affected
SUSE Linux Enterprise Real Time 15 SP3 snakeyaml Affected
SUSE Linux Enterprise Server 15 SP2 snakeyaml Affected
SUSE Linux Enterprise Server 15 SP2-BCL snakeyaml Affected
SUSE Linux Enterprise Server 15 SP2-LTSS snakeyaml Affected
SUSE Linux Enterprise Server 15 SP3 snakeyaml Released
SUSE Linux Enterprise Server 15 SP4 snakeyaml Released
SUSE Linux Enterprise Server Business Critical Linux 15 SP2 snakeyaml Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP2 snakeyaml Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP3 snakeyaml Released
SUSE Linux Enterprise Server for SAP Applications 15 SP4 snakeyaml Released
SUSE Manager Proxy 4.1 snakeyaml Affected
SUSE Manager Proxy 4.2 snakeyaml Released
SUSE Manager Proxy 4.3 snakeyaml Released
SUSE Manager Retail Branch Server 4.1 snakeyaml Affected
SUSE Manager Retail Branch Server 4.2 snakeyaml Released
SUSE Manager Retail Branch Server 4.3 snakeyaml Released
SUSE Manager Server 4.1 snakeyaml Released
SUSE Manager Server 4.2 snakeyaml Released
SUSE Manager Server 4.3 snakeyaml Released
SUSE Manager Server Module 4.1 snakeyaml Released
SUSE Manager Server Module 4.2 snakeyaml Released
SUSE Manager Server Module 4.3 snakeyaml Released


SUSE Timeline for this CVE

CVE page created: Mon Sep 5 22:00:19 2022
CVE page last modified: Thu Dec 1 00:40:04 2022