Vulnerability Report: GO-2021-0061
- CVE-2021-4235, GHSA-r88r-gmrh-7j83
- Affects: gopkg.in/yaml.v2, github.com/go-yaml/yaml
- Published: Apr 14, 2021
- Modified: May 20, 2024
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.
Affected Packages
-
PathGo VersionsSymbols
-
before v2.2.3
-
all versions, no known fixed
Aliases
References
- https://github.com/go-yaml/yaml/pull/375
- https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241
- https://vuln.go.dev/ID/GO-2021-0061.json
Credits
- @simonferquel
Feedback
See anything missing or incorrect?
Suggest an edit to this report.