The compose-go library component in versions v2.10-v2.4.0 allows an authorized user who sends malicious YAML payloads to cause the compose-go to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions v2.27.0 to v2.29.7 included
Metrics
Affected Vendors & Products
References
History
Wed, 12 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 23 Jan 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The compose-go library component in versions v2.10-v2.4.0 allows an authorized user who sends malicious YAML payloads to cause the compose-go to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions v2.27.0 to v2.29.7 included | |
Title | Excessive Platform Resource Consumption within a Loop when unmarshalling Compose file having recursive loop | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Docker
Published:
Updated: 2025-02-12T17:05:14.108Z
Reserved: 2024-11-05T10:21:55.528Z
Link: CVE-2024-10846

Updated: 2025-02-12T17:04:55.213Z

Status : Received
Published: 2025-01-23T16:15:33.533
Modified: 2025-01-23T16:15:33.533
Link: CVE-2024-10846

No data.