A vulnerability was found in libyaml up to 0.2.5. Affected by this issue is the function yaml_event_delete of the file /src/libyaml/src/api.c. The manipulation leads to a double-free. https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35325.c
Created R-yaml tracking bugs for this issue: Affects: fedora-all [bug 2292359] Created ghc-yaml tracking bugs for this issue: Affects: epel-all [bug 2292358] Created libyaml tracking bugs for this issue: Affects: fedora-all [bug 2292357] Created python-ruamel-yaml-clib tracking bugs for this issue: Affects: fedora-all [bug 2292360]
The author of libyaml thinks it's a misuse of the API, not a vulnerability: https://github.com/yaml/libyaml/issues/303
Per the upstream developer, this involves a misuse of the underlying C API which is not necessary and not documented: https://github.com/yaml/libyaml/issues/297#issuecomment-2161577994