CVE-2014-2525
Publication date 27 March 2014
Last updated 24 July 2024
Ubuntu priority
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
Status
Package | Ubuntu Release | Status |
---|---|---|
libyaml | 13.10 saucy |
Fixed 0.1.4-2ubuntu0.13.10.3
|
12.10 quantal |
Fixed 0.1.4-2ubuntu0.12.10.3
|
|
12.04 LTS precise |
Fixed 0.1.4-2ubuntu0.12.04.3
|
|
10.04 LTS lucid | Ignored end of life | |
libyaml-libyaml-perl | 13.10 saucy |
Fixed 0.38-3ubuntu0.13.10.1
|
12.10 quantal |
Fixed 0.38-3ubuntu0.12.10.1
|
|
12.04 LTS precise |
Fixed 0.38-2ubuntu0.1
|
|
10.04 LTS lucid | Ignored end of life |
Patch details
Package | Patch details |
---|---|
libyaml | |
libyaml-libyaml-perl |
References
Related Ubuntu Security Notices (USN)
- USN-2161-1
- libyaml-libyaml-perl vulnerabilities
- 3 April 2014
- USN-2160-1
- LibYAML vulnerability
- 3 April 2014