CVE-2026-33320 in TomWright dasel
Сводка (Английский)
Dasel is a command-line tool and library for querying, modifying, and transforming data structures. Starting in version 3.0.0 and prior to version 3.3.1, Dasel's YAML reader allows an attacker who can supply YAML for processing to trigger extreme CPU and memory consumption. The issue is in the library's own `UnmarshalYAML` implementation, which manually resolves alias nodes by recursively following `yaml.Node.Alias` pointers without any expansion budget, bypassing go-yaml v4's built-in alias expansion limit. Version 3.3.2 contains a patch for the issue.
Ответственный
GitHub_M
Резервировать
18.03.2026
Раскрытие
24.03.2026
Записи
VulDB provides additional information and datapoints for this CVE:
| ИД | Уязвимость | CWE | Экс | Кон | CVE |
|---|---|---|---|---|---|
| 352596 | TomWright dasel Data Structure отказ в обслуживании | 674 | Не определено | Официальное исправление | CVE-2026-33320 |