Vulnerability Description
serde serde_yaml 0.6.0 to 0.8.3 is affected by: Uncontrolled Recursion. The impact is: Denial of service by aborting. The component is: from_* functions (all deserialization functions). The attack vector is: Parsing a malicious YAML file. The fixed version is: 0.8.4 and later.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Serde-Yaml Project | Serde-Yaml | >= 0.6.0, <= 0.8.3 |
Related Weaknesses (CWE)
References
- https://github.com/dtolnay/serde-yaml/pull/105Third Party Advisory
- https://github.com/dtolnay/serde-yaml/pull/105Third Party Advisory
FAQ
What is CVE-2019-1010183?
CVE-2019-1010183 is a vulnerability with a CVSS score of 6.5 (MEDIUM). serde serde_yaml 0.6.0 to 0.8.3 is affected by: Uncontrolled Recursion. The impact is: Denial of service by aborting. The component is: from_* functions (all deserialization functions). The attack vec...
How severe is CVE-2019-1010183?
CVE-2019-1010183 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-1010183?
Check the references section above for vendor advisories and patch information. Affected products include: Serde-Yaml Project Serde-Yaml.