The compose-go library component in versions v2.10-v2.4.0 allows an authorized user who sends malicious YAML payloads to cause the compose-go to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions v2.27.0 to v2.29.7 included
Metrics
Affected Vendors & Products
References
History
Fri, 25 Apr 2025 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 12 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 23 Jan 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The compose-go library component in versions v2.10-v2.4.0 allows an authorized user who sends malicious YAML payloads to cause the compose-go to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions v2.27.0 to v2.29.7 included | |
Title | Excessive Platform Resource Consumption within a Loop when unmarshalling Compose file having recursive loop | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Docker
Published: 2025-01-23T15:22:56.170Z
Updated: 2025-04-25T23:02:53.505Z
Reserved: 2024-11-05T10:21:55.528Z
Link: CVE-2024-10846

Updated: 2025-04-25T23:02:53.505Z

Status : Awaiting Analysis
Published: 2025-01-23T16:15:33.533
Modified: 2025-04-25T23:15:16.147
Link: CVE-2024-10846

No data.