Description
serde serde_yaml 0.6.0 to 0.8.3 is affected by: Uncontrolled Recursion. The impact is: Denial of service by aborting. The component is: from_* functions (all deserialization functions). The attack vector is: Parsing a malicious YAML file. The fixed version is: 0.8.4 and later.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-1928 | serde serde_yaml 0.6.0 to 0.8.3 is affected by: Uncontrolled Recursion. The impact is: Denial of service by aborting. The component is: from_* functions (all deserialization functions). The attack vector is: Parsing a malicious YAML file. The fixed version is: 0.8.4 and later. |
References
| Link | Providers |
|---|---|
| https://github.com/dtolnay/serde-yaml/pull/105 |
|
History
No history.
Status: PUBLISHED
Assigner: dwf
Published:
Updated: 2024-08-05T03:07:18.455Z
Reserved: 2019-03-20T00:00:00.000Z
Link: CVE-2019-1010183
No data.
Status : Modified
Published: 2019-07-25T13:15:11.593
Modified: 2024-11-21T04:18:02.057
Link: CVE-2019-1010183
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD