You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The compose-go library component in versions v2.10-v2.4.0 allows an authorized user who sends malicious YAML payloads to cause the compose-go to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions v2.27.0 to v2.29.7 included
Advisory GHSA-36gq-35j3-p9r9 references a vulnerability in the following Go modules:
Description:
Impact
The
compose-go
library component in versionsv2.10-v2.4.0
allows an authorized user who sends malicious YAML payloads to cause thecompose-go
to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versionsv2.27.0
tov2.29.7
includedPatches
compose-go
v2.24.1
fixed the issueWorkarounds
There isn't any known workaround.
References
[BUG] "docker-compose config" consumes huge amounts of memory with broken config docker/compose#12235
fix(reset): Add cycle detector in reset.go compose-spec/compose-go#703
refs issue:11706 Resolving the Alias value of Alias type node compose-spec/compose-go#618
https://githu...
References:
No existing reports found with this module or alias.
See doc/quickstart.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: