DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Subscriptions
No data.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 28 Aug 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 28 Aug 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in yaml_document_add_sequence in api.c. NOTE: the supplier disputes this because the finding represents a user error. The problem is that the application, which was making use of the libyaml library, omitted the required calls to the yaml_document_initialize and yaml_document_delete functions. | DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. |
Status: REJECTED
Assigner: mitre
Published:
Updated: 2024-08-28T15:41:24.084Z
Reserved: 2024-05-17T00:00:00.000Z
Link: CVE-2024-35329
No data.
Status : Rejected
Published: 2024-06-11T05:15:53.533
Modified: 2024-08-28T16:15:08.980
Link: CVE-2024-35329
OpenCVE Enrichment
No data.
Weaknesses