Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 719150 (CVE-2019-6285, CVE-2019-6292) - <dev-cpp/yaml-cpp-0.6.3-r3: Multiple vulnerabilities (CVE-2019-{6285,6292})
Summary: <dev-cpp/yaml-cpp-0.6.3-r3: Multiple vulnerabilities (CVE-2019-{6285,6292})
Status: RESOLVED FIXED
Alias: CVE-2019-6285, CVE-2019-6292
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [noglsa cve]
Keywords: CC-ARCHES, PullRequest
Depends on:
Blocks:
 
Reported: 2020-04-24 03:40 UTC by GLSAMaker/CVETool Bot
Modified: 2020-08-30 05:51 UTC (History)
2 users (show)

See Also:
Package list:
dev-cpp/yaml-cpp-0.6.3-r3
Runtime testing required: ---
nattka: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2020-04-24 03:40:49 UTC
CVE-2019-6292 (https://nvd.nist.gov/vuln/detail/CVE-2019-6292):
  An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYaml-C++)
  0.6.2. Stack Exhaustion occurs in YAML::SingleDocParser, and there is a
  stack consumption problem caused by recursive stack frames:
  HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode.
  Remote attackers could leverage this vulnerability to cause a
  denial-of-service via a cpp file.

CVE-2019-6285 (https://nvd.nist.gov/vuln/detail/CVE-2019-6285):
  The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka
  LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service
  (stack consumption and application crash) via a crafted YAML file.
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-24 14:07:00 UTC
(In reply to GLSAMaker/CVETool Bot from comment #0)
> CVE-2019-6285 (https://nvd.nist.gov/vuln/detail/CVE-2019-6285):
>   The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka
>   LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service
>   (stack consumption and application crash) via a crafted YAML file.

Patches: https://github.com/jbeder/yaml-cpp/pull/807
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2020-07-04 22:08:55 UTC
That PR mentions fixing these too:

CVE-2018-20573:

The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

CVE-2018-20574:

The SingleDocParser::HandleFlowMap function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
Comment 3 Larry the Git Cow gentoo-dev 2020-07-27 02:27:20 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=9530f57129611ca33ca70dc96727466a082784e4

commit 9530f57129611ca33ca70dc96727466a082784e4
Author:     John Helmert III <jchelmert3@posteo.net>
AuthorDate: 2020-07-07 01:19:02 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2020-07-27 02:18:13 +0000

    dev-cpp/yaml-cpp: Revbump to add security patch
    
    Bug: https://bugs.gentoo.org/719150
    Package-Manager: Portage-2.3.103, Repoman-2.3.23
    Signed-off-by: John Helmert III <jchelmert3@posteo.net>
    Signed-off-by: Sam James <sam@gentoo.org>

 .../files/yaml-cpp-0.6.3-fix-overflows.patch       | 149 +++++++++++++++++++++
 dev-cpp/yaml-cpp/yaml-cpp-0.6.3-r3.ebuild          |  49 +++++++
 2 files changed, 198 insertions(+)
Comment 4 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-07-27 02:28:52 UTC
Should be OK to stable but let's give it a few days first because we've had problems in the past with this package.
Comment 5 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-08-07 02:17:27 UTC
sparc done
Comment 6 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-08-07 12:15:02 UTC
arm64 done
Comment 7 Agostino Sarubbo gentoo-dev 2020-08-11 11:00:41 UTC
amd64 stable
Comment 8 Agostino Sarubbo gentoo-dev 2020-08-12 06:01:32 UTC
x86 stable
Comment 9 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-08-29 18:22:05 UTC
ppc done
Comment 10 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-08-30 05:49:26 UTC
ppc64 done

all arches done
Comment 11 Larry the Git Cow gentoo-dev 2020-08-30 05:51:22 UTC
The bug has been closed via the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e80822e8f1fb71bcb7faec08eade7ba7171cb29b

commit e80822e8f1fb71bcb7faec08eade7ba7171cb29b
Author:     Sam James <sam@gentoo.org>
AuthorDate: 2020-08-30 05:51:18 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2020-08-30 05:51:18 +0000

    dev-cpp/yaml-cpp: security cleanup
    
    Closes: https://bugs.gentoo.org/719150
    Package-Manager: Portage-3.0.4, Repoman-3.0.1
    Signed-off-by: Sam James <sam@gentoo.org>

 dev-cpp/yaml-cpp/yaml-cpp-0.6.3-r2.ebuild | 48 -------------------------------
 1 file changed, 48 deletions(-)