Search CVE reports
1 – 2 of 2 results
CVE-2022-3064
Medium prioritySome fixes available 3 of 33
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.
6 affected packages
golang-github-coreos-discovery-etcd-io, golang-gopkg-yaml.v3, golang-yaml.v2, kubernetes, singularity-container, webhook
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
golang-github-coreos-discovery-etcd-io | Needs evaluation | Needs evaluation | Needs evaluation | Not in release |
golang-gopkg-yaml.v3 | Not affected | Not affected | Not in release | Not in release |
golang-yaml.v2 | Not affected | Not affected | Fixed | Fixed |
kubernetes | Needs evaluation | Needs evaluation | Needs evaluation | Not in release |
singularity-container | Needs evaluation | Not in release | Not in release | Needs evaluation |
webhook | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2021-4235
Medium prioritySome fixes available 3 of 33
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.
6 affected packages
golang-github-coreos-discovery-etcd-io, golang-gopkg-yaml.v3, golang-yaml.v2, kubernetes, singularity-container, webhook
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
golang-github-coreos-discovery-etcd-io | Needs evaluation | Needs evaluation | Needs evaluation | Not in release |
golang-gopkg-yaml.v3 | Not affected | Not affected | Not in release | Not in release |
golang-yaml.v2 | Not affected | Not affected | Fixed | Fixed |
kubernetes | Needs evaluation | Needs evaluation | Needs evaluation | Not in release |
singularity-container | Needs evaluation | Not in release | Not in release | Needs evaluation |
webhook | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |