Excessive Platform Resource Consumption within a Loop when unmarshalling Compose file having recursive loop
Moderate severity
GitHub Reviewed
Published
Jan 21, 2025
in
compose-spec/compose-go
•
Updated Jan 23, 2025
Package
Affected versions
>= 2.1.0, < 2.4.1
Patched versions
2.4.1
Description
Published to the GitHub Advisory Database
Jan 21, 2025
Reviewed
Jan 21, 2025
Published by the National Vulnerability Database
Jan 23, 2025
Last updated
Jan 23, 2025
Impact
The
compose-go
library component in versionsv2.10-v2.4.0
allows an authorized user who sends malicious YAML payloads to cause thecompose-go
to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versionsv2.27.0
tov2.29.7
includedPatches
compose-go
v2.24.1
fixed the issueWorkarounds
There isn't any known workaround.
References
docker/compose#12235
compose-spec/compose-go#703
compose-spec/compose-go#618
docker/compose@d239f0f#diff-33ef32bf6c23acb95f5902d7097b7a1d5128ca061167ec0716715b0b9eeaa5f6R10
References