Bug 1226340 (CVE-2024-35326)

Summary: VUL-0: CVE-2024-35326: TRACKERBUG: libyaml: double-free in yaml_emitter_emit in /src/libyaml/src/emitter.c
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: camila.matos
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/410665/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-35326:7.8:(AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on: 1226343, 1226348, 1226351, 1226354, 1226357, 1226360, 1226363    
Bug Blocks:    

Description SMASH SMASH 2024-06-14 13:07:12 UTC
libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-35326
https://www.cve.org/CVERecord?id=CVE-2024-35326
https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35326.c
https://bugzilla.redhat.com/show_bug.cgi?id=2292351
Comment 1 Camila Camargo de Matos 2024-06-14 16:42:46 UTC
Upstream discussion involving this issue:
https://github.com/yaml/libyaml/issues/298