Gentoo: GLSA-201405-27: LibYAML: Arbitrary code execution
Summary
The yaml_parser_scan_uri_escapes() function does not properly expand strings passed as input, which can result in a heap-based buffer overflow.
Resolution
All LibYAML users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libyaml-0.1.6"
Packages which depend on this library may need to be recompiled. Tools
such as revdep-rebuild may assist in identifying these packages.
References
[ 1 ] CVE-2014-2525 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2525
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201405-27
Concerns
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
Synopsis
A vulnerability in LibYAML could allow an attacker to execute arbitrary code or cause a Denial of Service condition.
Background
LibYAML is a YAML 1.1 parser and emitter written in C.
Affected Packages
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/libyaml < 0.1.6 >= 0.1.6
Impact
===== An attacker could provide a specially-crafted YAML document, which, when parsed by LibYAML, could result in arbitrary code execution or cause the application to crash.
Workaround
There is no known workaround at this time.