vulndb/data/osv/GO-2021-0061.json

94 строки
2.1 KiB
JSON

{
"schema_version": "1.3.1",
"id": "GO-2021-0061",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2021-4235",
"GHSA-r88r-gmrh-7j83"
],
"summary": "Denial of service in gopkg.in/yaml.v2",
"details": "Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "gopkg.in/yaml.v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "gopkg.in/yaml.v2",
"symbols": [
"Decoder.Decode",
"Unmarshal",
"UnmarshalStrict",
"decoder.unmarshal"
]
}
]
}
},
{
"package": {
"name": "github.com/go-yaml/yaml",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/go-yaml/yaml",
"symbols": [
"Decoder.Decode",
"Unmarshal",
"UnmarshalStrict",
"decoder.unmarshal"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/go-yaml/yaml/pull/375"
},
{
"type": "FIX",
"url": "https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241"
}
],
"credits": [
{
"name": "@simonferquel"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0061",
"review_status": "REVIEWED"
}
}