First published: Mon Nov 25 2013(Updated: )
A heap-based buffer overflow flaw was found in the way libyaml parsed YAML tags. A remote attacker could provide a specially-crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. Acknowledgements: This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/libyaml | <0.2.3 | 0.2.3 |
redhat/libyaml | <0.1.5 | 0.1.5 |
<=0.1.4 | ||
=0.0.1 | ||
=0.1.1 | ||
=0.1.2 | ||
=0.1.3 | ||
=12.04 | ||
=12.10 | ||
=13.10 | ||
=3.0 | ||
=4.0 | ||
=6.0 | ||
=7.0 | ||
=42.1 | ||
=11.4 | ||
=13.1 | ||
=13.2 | ||
Pyyaml Libyaml | <=0.1.4 | |
Pyyaml Libyaml | =0.0.1 | |
Pyyaml Libyaml | =0.1.1 | |
Pyyaml Libyaml | =0.1.2 | |
Pyyaml Libyaml | =0.1.3 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.10 | |
Canonical Ubuntu Linux | =13.10 | |
Redhat Openstack | =3.0 | |
Redhat Openstack | =4.0 | |
Debian Debian Linux | =6.0 | |
Debian Debian Linux | =7.0 | |
openSUSE Leap | =42.1 | |
openSUSE openSUSE | =11.4 | |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.