From dce22c22b29ecd8d66549dcef2382b689b2dbbb3 Mon Sep 17 00:00:00 2001 From: Konrad Borowski Date: Mon, 17 Sep 2018 08:40:04 +0200 Subject: [PATCH] Add advisory for yaml-rust --- crates/yaml-rust/RUSTSEC-0000-0000.toml | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 crates/yaml-rust/RUSTSEC-0000-0000.toml diff --git a/crates/yaml-rust/RUSTSEC-0000-0000.toml b/crates/yaml-rust/RUSTSEC-0000-0000.toml new file mode 100644 index 0000000..b3892d1 --- /dev/null +++ b/crates/yaml-rust/RUSTSEC-0000-0000.toml @@ -0,0 +1,17 @@ +[advisory] +id = "RUSTSEC-0000-0000" +package = "yaml-rust" +date = "2018-09-17" +title = "Uncontrolled recursion leads to abort in deserialization" +description = """ +Affected versions of this crate did not prevent deep recursion while +deserializing data structures. + +This allows an attacker to make a YAML file with deeply nested structures +that causes an abort while deserializing it. + +The flaw was corrected by checking the recursion depth. +""" +patched_versions = [">= 0.4.1"] +url = "https://github.com/chyh1990/yaml-rust/pull/109" +keywords = ["crash"]