Go modules package
gopkg.in/yaml.v2
pkg:golang/gopkg.in/yaml.v2
Vulnerabilities (3)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-3064 | — | < 2.2.4 | 2.2.4 | Dec 27, 2022 | Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory. | ||
| CVE-2021-4235 | — | < 2.2.3 | 2.2.3 | Dec 27, 2022 | Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector. | ||
| CVE-2019-11254 | — | < 2.2.8 | 2.2.8 | Apr 1, 2020 | The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML. |
- CVE-2022-3064Dec 27, 2022affected < 2.2.4fixed 2.2.4
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.
- CVE-2021-4235Dec 27, 2022affected < 2.2.3fixed 2.2.3
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.
- CVE-2019-11254Apr 1, 2020affected < 2.2.8fixed 2.2.8
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.