CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
9.6%
libyaml v0.2.5 is vulnerable to DDOS. Affected by this issue is the
function yaml_parser_parse of the file /src/libyaml/src/parser.c.
Author | Note |
---|---|
jdstrand | golang-goyaml is a go translation of libyaml and shouldn’t share implementation flaws, but may share design flaws |
mdeslaur | This is a misuse of the API per the upstream libyaml developers. This CVE is likely to get rejected, marking as deferred to make sure. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 16.04 | noarch | golang-goyaml | < any | UNKNOWN |
ubuntu | 18.04 | noarch | golang-yaml.v2 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | golang-yaml.v2 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | golang-yaml.v2 | < any | UNKNOWN |
ubuntu | 24.04 | noarch | golang-yaml.v2 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | golang-yaml.v2 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | libyaml | < any | UNKNOWN |
ubuntu | 20.04 | noarch | libyaml | < any | UNKNOWN |
ubuntu | 22.04 | noarch | libyaml | < any | UNKNOWN |
ubuntu | 24.04 | noarch | libyaml | < any | UNKNOWN |
github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c
github.com/yaml/libyaml/issues/298#issuecomment-2167684233
github.com/yaml/libyaml/issues/302
launchpad.net/bugs/cve/CVE-2024-35328
nvd.nist.gov/vuln/detail/CVE-2024-35328
security-tracker.debian.org/tracker/CVE-2024-35328
www.cve.org/CVERecord?id=CVE-2024-35328