Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2024-3205

Published: 2 April 2024

A vulnerability was found in yaml libyaml up to 0.2.5 and classified as critical. Affected by this issue is the function yaml_emitter_emit_flow_sequence_item of the file /src/libyaml/src/emitter.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259052. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Notes

AuthorNote
jdstrand
golang-goyaml is a go translation of libyaml and shouldn't share
implementation flaws, but may share design flaws

Priority

Medium

Status

Package Release Status
golang-goyaml
Launchpad, Ubuntu, Debian
focal Does not exist

jammy Does not exist

mantic Does not exist

upstream Needs triage

xenial Needs triage

golang-yaml.v2
Launchpad, Ubuntu, Debian
bionic Needs triage

focal Needs triage

jammy Needs triage

mantic Needs triage

upstream Needs triage

xenial Needs triage

libyaml
Launchpad, Ubuntu, Debian
bionic Needs triage

focal Needs triage

jammy Needs triage

mantic Needs triage

trusty Needs triage

upstream Needs triage

xenial Needs triage

Patches:
upstream: https://github.com/yaml/libyaml/pull/259
upstream: https://github.com/yaml/libyaml/pull/290
libyaml-libyaml-perl
Launchpad, Ubuntu, Debian
bionic Needs triage

focal Needs triage

jammy Needs triage

mantic Needs triage

upstream Needs triage

xenial Needs triage