Closed mend-for-github-com[bot] closed 2 years ago
A modern load testing tool, using Go and JavaScript - https://k6.io
Found in HEAD commit: 39985b18486b3259ef19a076284f4a70c52d28c7
Dependency Hierarchy: - :x: **github.com/grafana/k6-v0.38.3** (Vulnerable Library)
Found in base branch: main
An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.
Publish Date: 2022-05-19
URL: CVE-2022-28948
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Origin: https://security-tracker.debian.org/tracker/CVE-2022-28948
Release Date: 2022-05-19
Fix Resolution: v3.0.0
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
Vulnerable Library - github.com/grafana/k6-v0.38.3
A modern load testing tool, using Go and JavaScript - https://k6.io
Found in HEAD commit: 39985b18486b3259ef19a076284f4a70c52d28c7
Vulnerabilities
Details
CVE-2022-28948
### Vulnerable Library - github.com/grafana/k6-v0.38.3A modern load testing tool, using Go and JavaScript - https://k6.io
Dependency Hierarchy: - :x: **github.com/grafana/k6-v0.38.3** (Vulnerable Library)
Found in HEAD commit: 39985b18486b3259ef19a076284f4a70c52d28c7
Found in base branch: main
### Vulnerability DetailsAn issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.
Publish Date: 2022-05-19
URL: CVE-2022-28948
### CVSS 3 Score Details (7.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://security-tracker.debian.org/tracker/CVE-2022-28948
Release Date: 2022-05-19
Fix Resolution: v3.0.0