ALAS-2014-321

Related Vulnerabilities: CVE-2014-2525  

Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.

ALAS-2014-321


Amazon Linux AMI Security Advisory: ALAS-2014-321
Advisory Release Date: 2014-04-10 23:54 Pacific
Advisory Updated Date: 2014-09-18 00:19 Pacific
Severity: Important
References: CVE-2014-2525 

Issue Overview:

Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.


Affected Packages:

libyaml


Issue Correction:
Run yum update libyaml to update your system.

New Packages:
i686:
    libyaml-debuginfo-0.1.6-1.6.amzn1.i686
    libyaml-devel-0.1.6-1.6.amzn1.i686
    libyaml-0.1.6-1.6.amzn1.i686

src:
    libyaml-0.1.6-1.6.amzn1.src

x86_64:
    libyaml-devel-0.1.6-1.6.amzn1.x86_64
    libyaml-debuginfo-0.1.6-1.6.amzn1.x86_64
    libyaml-0.1.6-1.6.amzn1.x86_64