{"id":"UBUNTU-CVE-2022-38752","details":"Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.","modified":"2026-01-30T01:52:56.955409Z","published":"2022-09-05T10:15:00Z","withdrawn":"2025-06-23T15:55:05Z","related":["CVE-2022-38752"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-38752"},{"type":"REPORT","url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47081"},{"type":"REPORT","url":"https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-38752"}],"affected":[{"package":{"name":"snakeyaml","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/snakeyaml@1.12-2ubuntu0.14.04.1~esm1?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.12-2","1.12-2ubuntu0.14.04.1~esm1"],"ecosystem_specific":{"ubuntu_priority":"medium"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-38752.json"}},{"package":{"name":"snakeyaml","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/snakeyaml@1.12-2ubuntu0.16.04.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.12-2","1.12-2ubuntu0.16.04.1~esm1"],"ecosystem_specific":{"ubuntu_priority":"medium"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-38752.json"}},{"package":{"name":"snakeyaml","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/snakeyaml@1.23-1+deb10u1build0.18.04.1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.17-1","1.19-1","1.20-1","1.23-1~18.04","1.23-1+deb10u1build0.18.04.1"],"ecosystem_specific":{"ubuntu_priority":"medium"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-38752.json"}},{"package":{"name":"snakeyaml","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/snakeyaml@1.25+ds-2ubuntu0.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.23-1","1.25+ds-2","1.25+ds-2ubuntu0.1"],"ecosystem_specific":{"ubuntu_priority":"medium"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-38752.json"}},{"package":{"name":"snakeyaml","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/snakeyaml@1.29-1ubuntu0.22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.28-1","1.29-1","1.29-1ubuntu0.22.04.1"],"ecosystem_specific":{"ubuntu_priority":"medium"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-38752.json"}},{"package":{"name":"snakeyaml","ecosystem":"Ubuntu:24.10","purl":"pkg:deb/ubuntu/snakeyaml@1.33-2?arch=source&distro=oracular"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.33-2"],"ecosystem_specific":{"ubuntu_priority":"medium"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-38752.json"}},{"package":{"name":"snakeyaml","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/snakeyaml@1.33-2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.33-2"],"ecosystem_specific":{"ubuntu_priority":"medium"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-38752.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}