Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-3205
HistoryApr 02, 2024 - 12:00 a.m.

CVE-2024-3205

2024-04-0200:00:00
ubuntu.com
ubuntu.com
15
vulnerability
yaml libyaml
critical
buffer overflow
remote attack
public disclosure

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

A vulnerability was found in yaml libyaml up to 0.2.5 and classified as
critical. Affected by this issue is the function
yaml_emitter_emit_flow_sequence_item of the file
/src/libyaml/src/emitter.c. The manipulation leads to heap-based buffer
overflow. The attack may be launched remotely. The exploit has been
disclosed to the public and may be used. The identifier of this
vulnerability is VDB-259052. NOTE: The vendor was contacted early about
this disclosure but did not respond in any way.

Bugs

Notes

Author Note
jdstrand golang-goyaml is a go translation of libyaml and shouldn’t share implementation flaws, but may share design flaws
sbeattie as of 2024-04-15, fix has not landed upstream.
mdeslaur libyaml-libyaml-perl, golang-goyaml, and golang-yaml.v2 are unrelated codebases. This appears to be an issue with the fuzzer, not libyaml itself: https://github.com/yaml/libyaml/issues/258#issuecomment-2058613931 The libyaml project doesn’t think this CVE should be. Marking as not-affected.

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%