FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-24 21:00:48 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
111f1f84-1d14-4ff2-a9ea-cf07119c0d3blibyaml heap overflow resulting in possible code execution

libyaml was prone to a heap overflow that could result in arbitrary code execution. Pkg uses libyaml to parse the package manifests in some cases. Pkg also used libyaml to parse the remote repository until 1.2.

RedHat Product Security Team reports on libyaml:

A heap-based buffer overflow flaw was found in the way libyaml parsed YAML tags. A remote attacker could provide a specially-crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.


Discovery 2013-11-24
Entry 2014-02-01
Modified 2014-02-01
libyaml
< 0.1.4_3

pkg
< 1.2.6

pkg-devel
< 1.2.6

CVE-2013-6393
https://bugzilla.redhat.com/show_bug.cgi?id=1033990
580cc46b-bb1e-11e3-b144-2c4138874f7dLibYAML input sanitization errors

oCERT reports:

The LibYAML project is an open source YAML 1.1 parser and emitter written in C.

The library is affected by a heap-based buffer overflow which can lead to arbitrary code execution. The vulnerability is caused by lack of proper expansion for the string passed to the yaml_parser_scan_uri_escapes() function.

A specially crafted YAML file, with a long sequence of percent-encoded characters in a URL, can be used to trigger the overflow.


Discovery 2014-03-11
Entry 2014-03-26
libyaml
< 0.1.6

mingw32-libyaml
< 0.1.6

CVE-2014-2525
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525