DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Metrics
Affected Vendors & Products
References
History
Wed, 28 Aug 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 28 Aug 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in yaml_document_add_sequence in api.c. NOTE: the supplier disputes this because the finding represents a user error. The problem is that the application, which was making use of the libyaml library, omitted the required calls to the yaml_document_initialize and yaml_document_delete functions. | DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. |
MITRE
Status: REJECTED
Assigner: mitre
Published: 2024-06-11T00:00:00
Updated: 2024-08-28T15:41:24.084659
Reserved: 2024-05-17T00:00:00
Link: CVE-2024-35329
Vulnrichment
No data.
NVD
Status : Rejected
Published: 2024-06-11T05:15:53.533
Modified: 2024-08-28T16:15:08.980
Link: CVE-2024-35329
Redhat