DSA-3103-1 libyaml-libyaml-perl -- security update

Related Vulnerabilities: CVE-2014-9130  

Jonathan Gray and Stanislaw Pitucha found an assertion failure in the way wrapped strings are parsed in LibYAML, a fast YAML 1.1 parser and emitter library. An attacker able to load specially crafted YAML input into an application using libyaml could cause the application to crash. This update corrects this flaw in the copy that is embedded in the libyaml-libyaml-perl package. For the stable distribution (wheezy), this problem has been fixed in version 0.38-3+deb7u3. For the upcoming stable distribution (jessie), this problem has been fixed in version 0.41-6. For the unstable distribution (sid), this problem has been fixed in version 0.41-6. We recommend that you upgrade your libyaml-libyaml-perl packages.

Debian Security Advisory

DSA-3103-1 libyaml-libyaml-perl -- security update

Date Reported:
13 Dec 2014
Affected Packages:
libyaml-libyaml-perl
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 771365.
In Mitre's CVE dictionary: CVE-2014-9130.
More information:

Jonathan Gray and Stanislaw Pitucha found an assertion failure in the way wrapped strings are parsed in LibYAML, a fast YAML 1.1 parser and emitter library. An attacker able to load specially crafted YAML input into an application using libyaml could cause the application to crash.

This update corrects this flaw in the copy that is embedded in the libyaml-libyaml-perl package.

For the stable distribution (wheezy), this problem has been fixed in version 0.38-3+deb7u3.

For the upcoming stable distribution (jessie), this problem has been fixed in version 0.41-6.

For the unstable distribution (sid), this problem has been fixed in version 0.41-6.

We recommend that you upgrade your libyaml-libyaml-perl packages.