Impact
The compose-go
library component in versions v2.10-v2.4.0
allows an authorized user who sends malicious YAML payloads to cause the compose-go
to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions v2.27.0
to v2.29.7
included
Patches
compose-go v2.24.1
fixed the issue
Workarounds
There isn't any known workaround.
References
Impact
The
compose-go
library component in versionsv2.10-v2.4.0
allows an authorized user who sends malicious YAML payloads to cause thecompose-go
to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versionsv2.27.0
tov2.29.7
includedPatches
compose-go
v2.24.1
fixed the issueWorkarounds
There isn't any known workaround.
References
docker/compose#12235
#703
#618
docker/compose@d239f0f#diff-33ef32bf6c23acb95f5902d7097b7a1d5128ca061167ec0716715b0b9eeaa5f6R10