DSA-3102-1 libyaml -- security update

Related Vulnerabilities: CVE-2014-9130  

Jonathan Gray and Stanislaw Pitucha found an assertion failure in the way wrapped strings are parsed in LibYAML, a fast YAML 1.1 parser and emitter library. An attacker able to load specially crafted YAML input into an application using libyaml could cause the application to crash. For the stable distribution (wheezy), this problem has been fixed in version 0.1.4-2+deb7u5. For the upcoming stable distribution (jessie), this problem has been fixed in version 0.1.6-3. For the unstable distribution (sid), this problem has been fixed in version 0.1.6-3. We recommend that you upgrade your libyaml packages.

Debian Security Advisory

DSA-3102-1 libyaml -- security update

Date Reported:
13 Dec 2014
Affected Packages:
libyaml
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 771366.
In Mitre's CVE dictionary: CVE-2014-9130.
More information:

Jonathan Gray and Stanislaw Pitucha found an assertion failure in the way wrapped strings are parsed in LibYAML, a fast YAML 1.1 parser and emitter library. An attacker able to load specially crafted YAML input into an application using libyaml could cause the application to crash.

For the stable distribution (wheezy), this problem has been fixed in version 0.1.4-2+deb7u5.

For the upcoming stable distribution (jessie), this problem has been fixed in version 0.1.6-3.

For the unstable distribution (sid), this problem has been fixed in version 0.1.6-3.

We recommend that you upgrade your libyaml packages.