Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-3205

Опубликовано: 02 апр. 2024
Источник: redhat
CVSS3: 0

Описание

[REJECTED CVE] A vulnerability was found in yaml libyaml up to 0.2.5 and classified as critical. Affected by this issue is the function yaml_emitter_emit_flow_sequence_item of the file /src/libyaml/src/emitter.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely.

Отчет

This CVE has been rejected by upstream: https://github.com/yaml/libyaml/issues/258#issuecomment-2063497383. Red Hat has also evaluated this issue and determined that it does not meet the criteria to be classified as a security vulnerability. This assessment is based on the issue not posing a significant security risk, being a result of misconfiguration or usage error, or falling outside the scope of security considerations. As such, this CVE has been marked as "Rejected" in alignment with Red Hat's vulnerability management policies. If you have additional information or concerns regarding this determination, please contact Red Hat Product Security for further clarification.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libyamlNot affected
Red Hat Enterprise Linux 10python-ruamel-yaml-clibNot affected
Red Hat Enterprise Linux 6libyamlOut of support scope
Red Hat Enterprise Linux 7libyamlOut of support scope
Red Hat Enterprise Linux 8libyamlNot affected
Red Hat Enterprise Linux 8perl-YAML-LibYAMLNot affected
Red Hat Enterprise Linux 9libyamlNot affected
Red Hat Enterprise Linux 9python-ruamel-yaml-clibNot affected

Показывать по

Дополнительная информация

https://bugzilla.redhat.com/show_bug.cgi?id=2272889libyaml: Heap-Based Buffer Overflow

0 Low

CVSS3

Связанные уязвимости

ubuntu
почти 2 года назад

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The maintainer identified an error in the libyaml fuzzers. It is not possible to reproduce nor exploit the issue.

nvd
почти 2 года назад

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The maintainer identified an error in the libyaml fuzzers. It is not possible to reproduce nor exploit the issue.

CVSS3: 7.3
github
почти 2 года назад

A vulnerability was found in yaml libyaml up to 0.2.5 and classified as critical. Affected by this issue is the function yaml_emitter_emit_flow_sequence_item of the file /src/libyaml/src/emitter.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259052. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

0 Low

CVSS3