Closed dvasilen closed 2 years ago
YAML support for the Go language.
Dependency Hierarchy: - github.com/kubernetes-sigs/structured-merge-diff/v4-v4.2.1 - :x: **github.com/go-yaml/yaml-v2.4.0** (Vulnerable Library)
Found in base branch: master
An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.
Publish Date: 2022-05-19
URL: CVE-2022-28948
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Release Date: 2022-05-19
Fix Resolution: v3.0.0
Only reproducible in v3 as per https://github.com/go-yaml/yaml/issues/666#issuecomment-1133337993
CVE-2022-28948 - Medium Severity Vulnerability
Vulnerable Library - github.com/go-yaml/yaml-v2.4.0
YAML support for the Go language.
Dependency Hierarchy: - github.com/kubernetes-sigs/structured-merge-diff/v4-v4.2.1 - :x: **github.com/go-yaml/yaml-v2.4.0** (Vulnerable Library)
Found in base branch: master
Vulnerability Details
An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.
Publish Date: 2022-05-19
URL: CVE-2022-28948
CVSS 3 Score Details (5.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2022-05-19
Fix Resolution: v3.0.0