We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent ecf0648 commit 6b10ce0Copy full SHA for 6b10ce0
crates/yaml-rust/RUSTSEC-2018-0006.toml
@@ -13,6 +13,15 @@ This allows an attacker to make a YAML file with deeply nested structures
13
that causes an abort while deserializing it.
14
15
The flaw was corrected by checking the recursion depth.
16
+
17
+Note: `clap 2.33` is not affected by this because it uses `yaml-rust`
18
+in a way that doesn't trigger the vulnerability. More specifically:
19
20
+1. The input to the YAML parser is always trusted - is included at compile
21
+time via `include_str!`.
22
23
+2. The nesting level is never deep enough to trigger the overflow in practice
24
+(at most 5).
25
"""
26
aliases = ["CVE-2018-20993"]
27
0 commit comments