CVE-2024-10846
ADVISORY - githubSummary
Impact
The compose-go library component in versions v2.10-v2.4.0 allows an authorized user who sends malicious YAML payloads to cause the compose-go to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions v2.27.0 to v2.29.7 included
Patches
compose-go v2.24.1 fixed the issue
Workarounds
There isn't any known workaround.
References
EPSS Score: 0.00031 (0.087)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Improper Input Validation
NIST
CREATED
UPDATED
ADVISORY IDCVE-2024-10846
EXPLOITABILITY SCORE
1.5
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
5.9mediumGitHub
CVSS SCORE
5.9mediumGoLang
CREATED
UPDATED
ADVISORY IDGO-2025-3412
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-