openSUSE: 2022:1073-1 moderate: yaml-cpp
Description
This update for yaml-cpp fixes the following issues: - CVE-2018-20573: Fixed remote DOS via a crafted YAML file in function Scanner:EnsureTokensInQueue (bsc#1121227). - CVE-2018-20574: Fixed remote DOS via a crafted YAML file in function SingleDocParser:HandleFlowMap (bsc#1121230). - CVE-2019-6285: Fixed remote DOS via a crafted YAML file in function SingleDocParser::HandleFlowSequence (bsc#1122004). - CVE-2019-6292: Fixed DOS by stack consumption in singledocparser.cpp (bsc#1122021).
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-1073=1
Package List
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): libyaml-cpp0_6-0.6.1-4.5.1 libyaml-cpp0_6-debuginfo-0.6.1-4.5.1 yaml-cpp-debugsource-0.6.1-4.5.1 yaml-cpp-devel-0.6.1-4.5.1
References
https://www.suse.com/security/cve/CVE-2018-20573.html https://www.suse.com/security/cve/CVE-2018-20574.html https://www.suse.com/security/cve/CVE-2019-6285.html https://www.suse.com/security/cve/CVE-2019-6292.html https://bugzilla.suse.com/1121227 https://bugzilla.suse.com/1121230 https://bugzilla.suse.com/1122004 https://bugzilla.suse.com/1122021