Description
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.
Published: 2022-12-27
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3479-1 golang-yaml.v2 security update
EUVD EUVD EUVD-2022-7731 YAML Go package vulnerable to denial of service
Github GHSA Github GHSA GHSA-r88r-gmrh-7j83 YAML Go package vulnerable to denial of service
Ubuntu USN Ubuntu USN USN-6287-1 Go yaml vulnerabilities
History

Fri, 11 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Redhat Openshift Openshift Data Foundation
Yaml Project Yaml
cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2025-04-11T16:25:11.371Z

Reserved: 2022-07-29T18:56:20.415Z

Link: CVE-2021-4235

cve-icon Vulnrichment

Updated: 2024-08-03T17:23:09.096Z

cve-icon NVD

Status : Modified

Published: 2022-12-27T22:15:11.960

Modified: 2025-04-11T17:15:35.497

Link: CVE-2021-4235

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-12-27T00:00:00Z

Links: CVE-2021-4235 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses