Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-35329
HistoryJun 11, 2024 - 12:00 a.m.

CVE-2024-35329

2024-06-1100:00:00
ubuntu.com
ubuntu.com
1
libyaml 0.2.5
buffer overflow
yaml_document_add_sequence
golang-goyaml
design flaws
poc code
cve-2024-35329
unix

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in
yaml_document_add_sequence in api.c. NOTE: the supplier disputes this
because the finding represents a user error. The problem is that the
application, which was making use of the libyaml library, omitted the
required calls to the yaml_document_initialize and yaml_document_delete
functions.

Bugs

Notes

Author Note
jdstrand golang-goyaml is a go translation of libyaml and shouldn’t share implementation flaws, but may share design flaws
mdeslaur Per upstream developers, the PoC code is wrong and they will request that the CVE be rejected. Marking as deferred until it is, just to make sure.

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for UB:CVE-2024-35329