Bug 13964

Summary: [CVE 21] yaml 0.2.5 CVEs found
Product: [ROSA-based products] ROSA Fresh Reporter: Yury <y.tumanov>
Component: System (kernel, glibc, systemd, bash, PAM...)Assignee: ROSA Linux Bugs <bugs>
Status: RESOLVED INVALID QA Contact: ROSA Linux Bugs <bugs>
Severity: critical    
Priority: Highest CC: e.kosachev, s.matveev, v.potapov, y.tumanov
Version: AllFlags: y.tumanov: secteam_verified+
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: CVE-2021-4235, CVE-2022-3064,
Whiteboard:
Platform: 2021.1 ROSA Vulnerability identifier:
RPM Package: ISO-related:
Bad POT generating: Upstream:

Description Yury 2023-10-18 20:32:32 MSK
Please patch CVEs for package yaml version 0.2.5
  
INFO (CVEs are): yaml 0.2.5
 cves found
CVE-2021-4235
Desc: Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-4235
Severity: MEDIUM
CVE-2022-3064
Desc: Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-3064
Severity: HIGH
Comment 1 Svyatoslav Matveev 2023-10-19 15:44:24 MSK
CVE касаются https://github.com/go-yaml/yaml,
не наш.
Comment 2 Yury 2023-10-19 21:44:32 MSK
secteam_verified