CVE-2013-6393 (retired)

Priority
Description
The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5
performs an incorrect cast, which allows remote attackers to cause a denial
of service (application crash) and possibly execute arbitrary code via
crafted tags in a YAML document, which triggers a heap-based buffer
overflow.
Notes
 mdeslaur> regression was introduced in USN-2098-1
 mdeslaur> redhat created three patches:
 mdeslaur> libyaml-string-overflow.patch is upstream
 mdeslaur> 1d73f004f49e6962cf936da98aecf0aec95c4c50
 mdeslaur> libyaml-node-id-hardening.patch seems to have been done
 mdeslaur> differently upstream in b77d42277c32b58a114a0fa0968038a4b0ab24f4
 mdeslaur> libyaml-indent-column-overflow-v2.patch was done differently
 mdeslaur> upstream in f859ed1eb757a3562b98a28a8ce69274bfd4b3f2 and
 mdeslaur> af3599437a87162554787c52d8b16eab553f537b
Assigned-to
mdeslaur
Package
Upstream:needed
More Information

Updated: 2019-08-23 08:58:31 UTC (commit 436fd4ed4cf0038ddd382cb8649607ace163dda7)