Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-35328

Опубликовано: 13 июн. 2024
Источник: redhat
CVSS3: 7.5

Описание

A flaw was found in the libyaml library. Setting a YAML string with the yaml_parser_set_input_string function to be parsed by the yaml_parser_parse function can cause an infinite loop, resulting in a denial of service in the application linked to the library.

Меры по смягчению последствий

Applications that do not parse YAML files/strings from untrusted sources will not be vulnerable to this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libyamlNot affected
Red Hat Enterprise Linux 10python-ruamel-yaml-clibNot affected
Red Hat Enterprise Linux 6libyamlNot affected
Red Hat Enterprise Linux 7libyamlNot affected
Red Hat Enterprise Linux 8libyamlNot affected
Red Hat Enterprise Linux 8perl-YAML-LibYAMLNot affected
Red Hat Enterprise Linux 9libyamlNot affected
Red Hat Enterprise Linux 9python-ruamel-yaml-clibNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-835
https://bugzilla.redhat.com/show_bug.cgi?id=2292339libyaml: denial of service in yaml_parser_parse of the file /src/libyaml/src/parser.c.

7.5 High

CVSS3

Связанные уязвимости

ubuntu
больше 1 года назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

nvd
больше 1 года назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

CVSS3: 7.5
github
больше 1 года назад

libyaml v0.2.5 is vulnerable to DDOS. Affected by this issue is the function yaml_parser_parse of the file /src/libyaml/src/parser.c.

7.5 High

CVSS3