Important: libyaml

2014-09-18T00:19:00
ID ALAS-2014-321
Type amazon
Reporter Amazon
Modified 2014-09-18T00:19:00

Description

Issue Overview:

Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.

Affected Packages:

libyaml

Issue Correction:
Run yum update libyaml to update your system.

New Packages:

i686:  
    libyaml-debuginfo-0.1.6-1.6.amzn1.i686  
    libyaml-devel-0.1.6-1.6.amzn1.i686  
    libyaml-0.1.6-1.6.amzn1.i686

src:  
    libyaml-0.1.6-1.6.amzn1.src

x86_64:  
    libyaml-devel-0.1.6-1.6.amzn1.x86_64  
    libyaml-debuginfo-0.1.6-1.6.amzn1.x86_64  
    libyaml-0.1.6-1.6.amzn1.x86_64