CVE-2014-2525
Publication date 27 March 2014
Last updated 24 July 2024
Ubuntu priority
Description
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| libyaml | 13.10 saucy |
Fixed 0.1.4-2ubuntu0.13.10.3
|
| 12.10 quantal |
Fixed 0.1.4-2ubuntu0.12.10.3
|
|
| 12.04 LTS precise |
Fixed 0.1.4-2ubuntu0.12.04.3
|
|
| 10.04 LTS lucid | Ignored end of life | |
| libyaml-libyaml-perl | 13.10 saucy |
Fixed 0.38-3ubuntu0.13.10.1
|
| 12.10 quantal |
Fixed 0.38-3ubuntu0.12.10.1
|
|
| 12.04 LTS precise |
Fixed 0.38-2ubuntu0.1
|
|
| 10.04 LTS lucid | Ignored end of life |
Patch details
| Package | Patch details |
|---|---|
| libyaml | |
| libyaml-libyaml-perl |
References
Related Ubuntu Security Notices (USN)
- USN-2161-1
- libyaml-libyaml-perl vulnerabilities
- 3 April 2014
- USN-2160-1
- LibYAML vulnerability
- 3 April 2014