Skip to content

Update snakeyaml in jruby-complete #7400

@apurtell

Description

@apurtell

jruby-complete 9.3.8.0 embeds a version of snakeyaml at ./META-INF/jruby.home/lib/ruby/stdlib/org/yaml/snakeyaml/ that is subject to CVE-2022-38751

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

Upgrade to 1.32 or later.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions