blob: 83f1705ea06c9f0b98ade5c487aa7252c1587820 [file] [log] [blame]
modules:
- module: gopkg.in/yaml.v2
versions:
- fixed: 2.2.4
vulnerable_at: 2.2.3
packages:
- package: gopkg.in/yaml.v2
symbols:
- decoder.unmarshal
- yaml_parser_increase_flow_level
- yaml_parser_roll_indent
derived_symbols:
- Decoder.Decode
- Unmarshal
- UnmarshalStrict
description: |
Parsing malicious or large YAML documents can consume excessive amounts of
CPU or memory.
published: 2022-08-29T22:15:46Z
references:
- fix: https://github.com/go-yaml/yaml/commit/f221b8435cfb71e54062f6c6e99e9ade30b124d5
- web: https://github.com/go-yaml/yaml/releases/tag/v2.2.4
cve_metadata:
id: CVE-2022-3064
cwe: 'CWE 400: Uncontrolled Resource Consumption'