Skip to content
This repository has been archived by the owner on Aug 2, 2022. It is now read-only.

RUSTSEC-2018-0006: Uncontrolled recursion leads to abort in deserialization #1

Closed
github-actions bot opened this issue Dec 18, 2020 · 2 comments
Labels

Comments

@github-actions
Copy link

Uncontrolled recursion leads to abort in deserialization

Details
Package yaml-rust
Version 0.3.5
URL chyh1990/yaml-rust#109
Date 2018-09-17
Patched versions >=0.4.1

Affected versions of this crate did not prevent deep recursion while
deserializing data structures.

This allows an attacker to make a YAML file with deeply nested structures
that causes an abort while deserializing it.

The flaw was corrected by checking the recursion depth.

Note: clap 2.33 is not affected by this because it uses yaml-rust
in a way that doesn't trigger the vulnerability. More specifically:

  1. The input to the YAML parser is always trusted - is included at compile
    time via include_str!.

  2. The nesting level is never deep enough to trigger the overflow in practice
    (at most 5).

See advisory page for additional details.

@github-actions
Copy link
Author

Marking Issue as stale, will be closed in 7 days if no more activity is seen

@github-actions github-actions bot added the stale label Feb 16, 2021
@github-actions
Copy link
Author

Closing Issue because it is marked as stale

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

0 participants