Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3479-1 | golang-yaml.v2 security update |
EUVD |
EUVD-2022-7537 | Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory. |
Github GHSA |
GHSA-6q6q-88xp-6f2r | yaml package for Go can consume excessive amounts of CPU or memory |
Ubuntu USN |
USN-6287-1 | Go yaml vulnerabilities |
Mon, 14 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2025-04-14T17:05:01.917Z
Reserved: 2022-08-30T15:40:50.104Z
Link: CVE-2022-3064
Updated: 2024-08-03T01:00:10.262Z
Status : Modified
Published: 2022-12-27T22:15:14.507
Modified: 2025-04-14T17:15:25.407
Link: CVE-2022-3064
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN