CVE-2022-28948
Published: 19 May 2022
An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.
Notes
Author | Note |
---|---|
jdstrand | snapd contains an embedded copy of golang-goyaml |
sbeattie | according to upstream, this likely only affects v3 implementations only PoC in revoked snyk report |
mdeslaur | only affects yaml.v3, not yaml.v2 |
Priority
Status
Package | Release | Status |
---|---|---|
snapd Launchpad, Ubuntu, Debian |
kinetic |
Ignored
(end of life, was needs-triage)
|
upstream |
Pending
(2.60.2)
|
|
focal |
Needed
|
|
jammy |
Needed
|
|
trusty |
Does not exist
|
|
xenial |
Needs triage
|
|
impish |
Ignored
(end of life)
|
|
bionic |
Needed
|
|
lunar |
Needed
|
|
mantic |
Needed
|
|
Patches: upstream: https://github.com/snapcore/snapd/pull/12959 |
||
golang-goyaml Launchpad, Ubuntu, Debian |
impish |
Does not exist
|
jammy |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Not vulnerable
(v3 only)
|
|
bionic |
Does not exist
|
|
focal |
Does not exist
|
|
xenial |
Not vulnerable
(v3 only)
|
|
kinetic |
Does not exist
|
|
lunar |
Does not exist
|
|
mantic |
Does not exist
|
|
golang-yaml.v2 Launchpad, Ubuntu, Debian |
trusty |
Does not exist
|
bionic |
Not vulnerable
(v3 only)
|
|
focal |
Not vulnerable
(v3 only)
|
|
impish |
Not vulnerable
(v3 only)
|
|
jammy |
Not vulnerable
(v3 only)
|
|
upstream |
Not vulnerable
(v3 only)
|
|
xenial |
Not vulnerable
(v3 only)
|
|
kinetic |
Not vulnerable
(v3 only)
|
|
lunar |
Not vulnerable
(v3 only)
|
|
mantic |
Not vulnerable
(v3 only)
|
|
golang-gopkg-yaml.v3 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
jammy |
Needs triage
|
|
trusty |
Does not exist
|
|
upstream |
Released
(3.0.1-1)
|
|
xenial |
Does not exist
|
|
impish |
Ignored
(end of life)
|
|
kinetic |
Not vulnerable
(3.0.1-1)
|
|
lunar |
Not vulnerable
(3.0.1-1)
|
|
mantic |
Not vulnerable
(3.0.1-1)
|
|
Patches: upstream: https://github.com/go-yaml/yaml/commit/8f96da9f5d5eff988554c1aae1784627c4bf6754 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28948
- https://github.com/go-yaml/yaml/issues/666
- https://github.com/go-yaml/yaml/issues/666#issuecomment-1133337993
- https://security.snyk.io/vuln/SNYK-GOLANG-GOPKGINYAMLV2-2840885
- https://github.com/advisories/GHSA-hp87-p4gw-j4gq
- NVD
- Launchpad
- Debian