DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
History

Wed, 28 Aug 2024 16:45:00 +0000


Wed, 28 Aug 2024 15:45:00 +0000

Type Values Removed Values Added
Description libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in yaml_document_add_sequence in api.c. NOTE: the supplier disputes this because the finding represents a user error. The problem is that the application, which was making use of the libyaml library, omitted the required calls to the yaml_document_initialize and yaml_document_delete functions. DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

cve-icon MITRE

Status: REJECTED

Assigner: mitre

Published: 2024-06-11T00:00:00

Updated: 2024-08-28T15:41:24.084659

Reserved: 2024-05-17T00:00:00

Link: CVE-2024-35329

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Rejected

Published: 2024-06-11T05:15:53.533

Modified: 2024-08-28T16:15:08.980

Link: CVE-2024-35329

cve-icon Redhat

Severity :

Publid Date: 2024-06-11T00:00:00Z

Links: CVE-2024-35329 - Bugzilla