CVE-2021-4235
27.12.2022, 22:15
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.Enginsight
| Vendor | Product | Version |
|---|---|---|
| yaml_project | yaml | 𝑥 < 2.2.3 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| golang-github-coreos-discovery-etcd-io |
| ||||||||||||||||||
| golang-gopkg-yaml.v3 |
| ||||||||||||||||||
| golang-yaml.v2 |
| ||||||||||||||||||
| kubernetes |
| ||||||||||||||||||
| singularity-container |
| ||||||||||||||||||
| webhook |
|
References