libyaml
libyaml copied to clipboard
Canonical source repository for LibYAML
https://nvd.nist.gov/vuln/detail/CVE-2024-35329
This patch adds a new macro STACK_NULL to check if given stack was initialized, in order to fix yaml#298, which is CVE-2024-35329. The root cause is stack(document->nodes) was used before...
If `yaml_emitter_dump` failed, the emitter might be in a broken state and have leftover states/events. `yaml_emitter_close` calls `yaml_emitter_emit` which will try to emit those events, so we should return early....
The following CVEs I do not consider as vulnerabilties: * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35326 https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35326.c * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35328 https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35329 https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35329.c They are all missing to initialize structs with the according proper functions...
The following CVE is a misuse of the libyaml API: * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35325 https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35325.c I can copy the relevant part of the code: ``` void poc() { yaml_document_t document; memset(&document, 0,...
This is related to CVE-2024-35326 Fixes #301