Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 410967 (CVE-2012-1152) - <dev-perl/YAML-LibYAML-0.380.0-r1: Format string vulnerability (CVE-2012-1152)
Summary: <dev-perl/YAML-LibYAML-0.380.0-r1: Format string vulnerability (CVE-2012-1152)
Status: RESOLVED FIXED
Alias: CVE-2012-1152
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://rt.cpan.org/Public/Bug/Displa...
Whiteboard: ~2 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2012-04-05 21:37 UTC by Tim Sammut (RETIRED)
Modified: 2012-09-10 11:38 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Tim Sammut (RETIRED) gentoo-dev 2012-04-05 21:37:19 UTC
A format string vulnerability has been found in dev-perl/YAML-LibYAML. There are a collection of references from the oss-security post at http://www.openwall.com/lists/oss-security/2012/03/10/4:

> 
> References:
> [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661548
> [2] https://bugzilla.redhat.com/show_bug.cgi?id=801738
> 
> CPAN tickets:
> [3] https://rt.cpan.org/Public/Bug/Display.html?id=75365
> [4] https://rt.cpan.org/Public/Bug/Display.html?id=46507
> 
> Proposed patch:
> [5]
> https://rt.cpan.org/Ticket/Attachment/920541/477607/YAML-LibYAML-0.35-format-error.patch
Comment 1 Torsten Veller (RETIRED) gentoo-dev 2012-04-08 13:36:45 UTC
Patch applied in YAML-LibYAML-0.380.0-r1.
Thanks
Comment 2 Tim Sammut (RETIRED) gentoo-dev 2012-04-08 15:27:35 UTC
Thank you, Torsten. Closing noglsa for ~arch only package.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2012-09-10 11:38:28 UTC
CVE-2012-1152 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1152):
  Multiple format string vulnerabilities in the error reporting functionality
  in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38
  for Perl allow remote attackers to cause a denial of service (process crash)
  via format string specifiers in a (1) YAML stream to the Load function, (2)
  YAML node to the load_node function, (3) YAML mapping to the load_mapping
  function, or (4) YAML sequence to the load_sequence function.