36 lines
1.2 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-35329",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-11T05:15:53.533",
"lastModified": "2024-08-02T03:15:51.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in yaml_document_add_sequence in api.c. NOTE: the supplier disputes this because the finding represents a user error. The problem is that the application, which was making use of the libyaml library, omitted the required calls to the yaml_document_initialize and yaml_document_delete functions."
},
{
"lang": "es",
"value": "libyaml 0.2.5 es vulnerable a un desbordamiento de b\u00fafer basado en mont\u00f3n en yaml_document_add_sequence en api.c."
}
],
"metrics": {},
"references": [
{
"url": "https://drive.google.com/file/d/1xgQ9hJ7Sn5RVEsdMGvIy0s3b_bg3Wyk-/view?usp=sharing",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yaml/libyaml/releases/tag/0.2.5",
"source": "cve@mitre.org"
}
]
}