{ "id": "CVE-2024-35329", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-11T05:15:53.533", "lastModified": "2024-08-02T03:15:51.520", "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in yaml_document_add_sequence in api.c. NOTE: the supplier disputes this because the finding represents a user error. The problem is that the application, which was making use of the libyaml library, omitted the required calls to the yaml_document_initialize and yaml_document_delete functions." }, { "lang": "es", "value": "libyaml 0.2.5 es vulnerable a un desbordamiento de b\u00fafer basado en mont\u00f3n en yaml_document_add_sequence en api.c." } ], "metrics": {}, "references": [ { "url": "https://drive.google.com/file/d/1xgQ9hJ7Sn5RVEsdMGvIy0s3b_bg3Wyk-/view?usp=sharing", "source": "cve@mitre.org" }, { "url": "https://github.com/yaml/libyaml/releases/tag/0.2.5", "source": "cve@mitre.org" } ] }