Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 3 Apr 2014 11:07:25 +0000 (UTC)
From:      Akinori MUSHA <knu@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r349992 - head/security/vuxml
Message-ID:  <201404031107.s33B7Pjg034192@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: knu
Date: Thu Apr  3 11:07:25 2014
New Revision: 349992
URL: http://svnweb.freebsd.org/changeset/ports/349992
QAT: https://qat.redports.org/buildarchive/r349992/

Log:
  Add CVE-2014-2525 which affects libyaml.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Apr  3 11:06:34 2014	(r349991)
+++ head/security/vuxml/vuln.xml	Thu Apr  3 11:07:25 2014	(r349992)
@@ -51,6 +51,45 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="580cc46b-bb1e-11e3-b144-2c4138874f7d">
+    <topic>LibYAML input sanitization errors</topic>
+    <affects>
+      <package>
+	<name>libyaml</name>
+	<range><lt>0.1.6</lt></range>
+      </package>
+      <package>
+	<name>mingw32-libyaml</name>
+	<range><lt>0.1.6</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>oCERT reports:</p>
+	<blockquote cite="http://www.ocert.org/advisories/ocert-2014-003.html">;
+	  <p>The LibYAML project is an open source YAML 1.1 parser and
+	    emitter written in C.</p>
+	  <p>The library is affected by a heap-based buffer overflow
+	    which can lead to arbitrary code execution. The
+	    vulnerability is caused by lack of proper expansion for the
+	    string passed to the yaml_parser_scan_uri_escapes()
+	    function.</p>
+	  <p>A specially crafted YAML file, with a long sequence of
+	    percent-encoded characters in a URL, can be used to trigger
+	    the overflow.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2014-2525</cvename>
+      <url>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525</url>;
+    </references>
+    <dates>
+      <discovery>2014-03-11</discovery>
+      <entry>2014-03-26</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="4e95eb4e-b737-11e3-87cd-f0def10dca57">
     <topic>Icinga -- buffer overflow in classic web interface</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201404031107.s33B7Pjg034192>