Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/candlepin@4.2.13-1?arch=el8sat
purl pkg:rpm/redhat/candlepin@4.2.13-1?arch=el8sat
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 10.0
Vulnerabilities affecting this package (12)
Vulnerability Summary Fixed by
VCID-2cup-9gdn-yyhk
Aliases:
CVE-2021-46877
GHSA-3x8x-79m2-3w2w
jackson-databind possible Denial of Service if using JDK serialization to serialize JsonNode jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. There are no reported fixed by versions.
VCID-4nu3-fknt-puej
Aliases:
CVE-2022-38750
GHSA-hhhw-99gj-p3c3
snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. There are no reported fixed by versions.
VCID-6354-p39b-zbhp
Aliases:
CVE-2022-38749
GHSA-c4r9-r8fh-9vj2
snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. There are no reported fixed by versions.
VCID-9h46-72hw-bkcr
Aliases:
CVE-2022-42003
GHSA-jjjh-jjxp-wpff
Multiple vulnerabilities have been found in FasterXML jackson-databind, the worst of which could result in denial of service. There are no reported fixed by versions.
VCID-dmkc-42vj-gbhc
Aliases:
CVE-2022-1471
GHSA-mjmj-j48q-9wg2
SnakeYaml Constructor Deserialization Remote Code Execution ### Summary SnakeYaml's `Constructor` class, which inherits from `SafeConstructor`, allows any type be deserialized given the following line: new Yaml(new Constructor(TestDataClass.class)).load(yamlContent); Types do not have to match the types of properties in the target class. A `ConstructorException` is thrown, but only after a malicious payload is deserialized. ### Severity High, lack of type checks during deserialization allows remote code execution. ### Proof of Concept Execute `bash run.sh`. The PoC uses Constructor to deserialize a payload for RCE. RCE is demonstrated by using a payload which performs a http request to http://127.0.0.1:8000. Example output of successful run of proof of concept: ``` $ bash run.sh [+] Downloading snakeyaml if needed [+] Starting mock HTTP server on 127.0.0.1:8000 to demonstrate RCE nc: no process found [+] Compiling and running Proof of Concept, which a payload that sends a HTTP request to mock web server. [+] An exception is expected. Exception: Cannot create property=payload for JavaBean=Main$TestDataClass@3cbbc1e0 in 'string', line 1, column 1: payload: !!javax.script.ScriptEn ... ^ Can not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager in 'string', line 1, column 10: payload: !!javax.script.ScriptEngineManag ... ^ at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:291) at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.construct(Constructor.java:172) at org.yaml.snakeyaml.constructor.Constructor$ConstructYamlObject.construct(Constructor.java:332) at org.yaml.snakeyaml.constructor.BaseConstructor.constructObjectNoCheck(BaseConstructor.java:230) at org.yaml.snakeyaml.constructor.BaseConstructor.constructObject(BaseConstructor.java:220) at org.yaml.snakeyaml.constructor.BaseConstructor.constructDocument(BaseConstructor.java:174) at org.yaml.snakeyaml.constructor.BaseConstructor.getSingleData(BaseConstructor.java:158) at org.yaml.snakeyaml.Yaml.loadFromReader(Yaml.java:491) at org.yaml.snakeyaml.Yaml.load(Yaml.java:416) at Main.main(Main.java:37) Caused by: java.lang.IllegalArgumentException: Can not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager at java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:167) at java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:171) at java.base/jdk.internal.reflect.UnsafeObjectFieldAccessorImpl.set(UnsafeObjectFieldAccessorImpl.java:81) at java.base/java.lang.reflect.Field.set(Field.java:780) at org.yaml.snakeyaml.introspector.FieldProperty.set(FieldProperty.java:44) at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:286) ... 9 more [+] Dumping Received HTTP Request. Will not be empty if PoC worked GET /proof-of-concept HTTP/1.1 User-Agent: Java/11.0.14 Host: localhost:8000 Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2 Connection: keep-alive ``` ### Further Analysis Potential mitigations include, leveraging SnakeYaml's SafeConstructor while parsing untrusted content. See https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479 for discussion on the subject. ### Timeline **Date reported**: 4/11/2022 **Date fixed**: [30/12/2022](https://bitbucket.org/snakeyaml/snakeyaml/pull-requests/44) **Date disclosed**: 10/13/2022 There are no reported fixed by versions.
VCID-fb8u-g65k-hffs
Aliases:
CVE-2022-38752
GHSA-9w3m-gqgf-c4p9
snakeYAML before 1.32 vulnerable to Denial of Service due to Out-of-bounds Write Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DoS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow. There are no reported fixed by versions.
VCID-j986-mtma-b3bw
Aliases:
CVE-2022-42889
GHSA-599f-7c49-w659
Arbitrary code execution in Apache Commons Text Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default. There are no reported fixed by versions.
VCID-mbst-3bec-ykcq
Aliases:
CVE-2022-33980
GHSA-xj57-8qj4-c4m6
Code injection in Apache Commons Configuration Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the problematic interpolators by default. There are no reported fixed by versions.
VCID-mm3e-4pej-byed
Aliases:
CVE-2022-25857
GHSA-3mc7-4q67-w48m
Uncontrolled Resource Consumption in snakeyaml The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections. There are no reported fixed by versions.
VCID-qub7-qp14-uqcg
Aliases:
CVE-2022-41946
GHSA-562r-vg33-8x8h
TemporaryFolder on unix-like systems does not limit access to created files **Vulnerability** `PreparedStatement.setText(int, InputStream)` and `PreparedStatemet.setBytea(int, InputStream)` will create a temporary file if the InputStream is larger than 51k Example of vulnerable code: ```java String s = "some very large string greater than 51200 bytes"; PreparedStatement.setInputStream(1, new ByteArrayInputStream(s.getBytes()) ); ``` This will create a temporary file which is readable by other users on Unix like systems, but not MacOS. Impact On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. When analyzing the impact of this vulnerability, here are the important questions to ask: Is the driver running in an environment where the OS has other untrusted users. If yes, and you answered 'yes' to question 1, this vulnerability impacts you. If no, this vulnerability does not impact you. Patches Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. Java 1.8 and higher users: this vulnerability is fixed in 42.2.27, 42.3.8, 42.4.3, 42.5.1 Java 1.7 users: this vulnerability is fixed in 42.2.27.jre7 Java 1.6 and lower users: no patch is available; you must use the workaround below. Workarounds If you are unable to patch, or are stuck running on Java 1.6, specifying the java.io.tmpdir system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. References [CWE-200: Exposure of Sensitive Information to an Unauthorized Actor](https://cwe.mitre.org/data/definitions/200.html) Fix commit https://github.com/pgjdbc/pgjdbc/commit/9008dc9aade6dbfe4efafcd6872ebc55f4699cf5 Similar Vulnerabilities Google Guava - https://github.com/google/guava/issues/4011 Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945 JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824 There are no reported fixed by versions.
VCID-qxfs-sq38-jfad
Aliases:
CVE-2022-38751
GHSA-98wm-3w3q-mw94
snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. There are no reported fixed by versions.
VCID-v2pq-1qhm-4qb9
Aliases:
CVE-2022-42004
GHSA-rgv9-q543-rqg4
Multiple vulnerabilities have been found in FasterXML jackson-databind, the worst of which could result in denial of service. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:58:01.949247+00:00 RedHat Importer Affected by VCID-mbst-3bec-ykcq https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33980.json 38.0.0
2026-04-01T13:57:19.021727+00:00 RedHat Importer Affected by VCID-mm3e-4pej-byed https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25857.json 38.0.0
2026-04-01T13:57:15.651207+00:00 RedHat Importer Affected by VCID-fb8u-g65k-hffs https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38752.json 38.0.0
2026-04-01T13:57:15.522478+00:00 RedHat Importer Affected by VCID-qxfs-sq38-jfad https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38751.json 38.0.0
2026-04-01T13:57:15.392318+00:00 RedHat Importer Affected by VCID-4nu3-fknt-puej https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38750.json 38.0.0
2026-04-01T13:57:15.262175+00:00 RedHat Importer Affected by VCID-6354-p39b-zbhp https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38749.json 38.0.0
2026-04-01T13:56:59.798052+00:00 RedHat Importer Affected by VCID-v2pq-1qhm-4qb9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42004.json 38.0.0
2026-04-01T13:56:56.147136+00:00 RedHat Importer Affected by VCID-9h46-72hw-bkcr https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42003.json 38.0.0
2026-04-01T13:56:45.355321+00:00 RedHat Importer Affected by VCID-dmkc-42vj-gbhc https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1471.json 38.0.0
2026-04-01T13:56:44.398975+00:00 RedHat Importer Affected by VCID-j986-mtma-b3bw https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42889.json 38.0.0
2026-04-01T13:56:16.687770+00:00 RedHat Importer Affected by VCID-qub7-qp14-uqcg https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41946.json 38.0.0
2026-04-01T13:54:53.453654+00:00 RedHat Importer Affected by VCID-2cup-9gdn-yyhk https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46877.json 38.0.0