GHSA-6q6q-88xp-6f2r

Suggest an improvement
Source
https://github.com/advisories/GHSA-6q6q-88xp-6f2r
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-6q6q-88xp-6f2r/GHSA-6q6q-88xp-6f2r.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6q6q-88xp-6f2r
Aliases
Related
Published
2022-12-28T00:30:22Z
Modified
2023-11-08T04:09:19.535847Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
yaml package for Go can consume excessive amounts of CPU or memory
Details

Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory

Database specific
{
    "nvd_published_at": "2022-12-27T22:15:00Z",
    "cwe_ids": [
        "CWE-400"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-12-30T18:04:00Z"
}
References

Affected packages

Go / gopkg.in/yaml.v2

Package

Name
gopkg.in/yaml.v2
View open source insights on deps.dev
Purl
pkg:golang/gopkg.in/yaml.v2

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.4