Amazon Linux 1 Security Advisory: ALAS-2014-324
Advisory Release Date: 2014-04-17 14:18 Pacific
Advisory Updated Date: 2014-09-18 00:20 Pacific
The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
Affected Packages:
perl-YAML-LibYAML
Issue Correction:
Run yum update perl-YAML-LibYAML to update your system.
i686:
perl-YAML-LibYAML-debuginfo-0.41-4.9.amzn1.i686
perl-YAML-LibYAML-0.41-4.9.amzn1.i686
src:
perl-YAML-LibYAML-0.41-4.9.amzn1.src
x86_64:
perl-YAML-LibYAML-debuginfo-0.41-4.9.amzn1.x86_64
perl-YAML-LibYAML-0.41-4.9.amzn1.x86_64