Search CVE reports


Toggle filters

1 – 2 of 2 results


CVE-2022-3064

Medium priority

Some fixes available 3 of 33

Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.

6 affected packages

golang-github-coreos-discovery-etcd-io, golang-gopkg-yaml.v3, golang-yaml.v2, kubernetes, singularity-container, webhook

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
golang-github-coreos-discovery-etcd-io Needs evaluation Needs evaluation Needs evaluation Not in release
golang-gopkg-yaml.v3 Not affected Not affected Not in release Not in release
golang-yaml.v2 Not affected Not affected Fixed Fixed
kubernetes Needs evaluation Needs evaluation Needs evaluation Not in release
singularity-container Needs evaluation Not in release Not in release Needs evaluation
webhook Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2021-4235

Medium priority

Some fixes available 3 of 33

Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.

6 affected packages

golang-github-coreos-discovery-etcd-io, golang-gopkg-yaml.v3, golang-yaml.v2, kubernetes, singularity-container, webhook

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
golang-github-coreos-discovery-etcd-io Needs evaluation Needs evaluation Needs evaluation Not in release
golang-gopkg-yaml.v3 Not affected Not affected Not in release Not in release
golang-yaml.v2 Not affected Not affected Fixed Fixed
kubernetes Needs evaluation Needs evaluation Needs evaluation Not in release
singularity-container Needs evaluation Not in release Not in release Needs evaluation
webhook Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages