Skip to content

Commit 6b10ce0

Browse files
Update yaml-rust advirsory to indicate clap as non-vulnerable (#331)
1 parent ecf0648 commit 6b10ce0

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

crates/yaml-rust/RUSTSEC-2018-0006.toml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,15 @@ This allows an attacker to make a YAML file with deeply nested structures
1313
that causes an abort while deserializing it.
1414
1515
The flaw was corrected by checking the recursion depth.
16+
17+
Note: `clap 2.33` is not affected by this because it uses `yaml-rust`
18+
in a way that doesn't trigger the vulnerability. More specifically:
19+
20+
1. The input to the YAML parser is always trusted - is included at compile
21+
time via `include_str!`.
22+
23+
2. The nesting level is never deep enough to trigger the overflow in practice
24+
(at most 5).
1625
"""
1726
aliases = ["CVE-2018-20993"]
1827

0 commit comments

Comments
 (0)