Package: libyaml / 0.1.4-2+deb7u5
Metadata
| Package | Version | Patches format |
|---|---|---|
| libyaml | 0.1.4-2+deb7u5 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| libyaml string overflow.patch | (download) |
src/scanner.c |
2 1 + 1 - 0 ! |
cve-2013-6393: yaml_parser_scan_tag_uri: fix int overflow leading to buffer overflow This is a proposed patch from Florian Weimer <fweimer@redhat.com> for the string overflow issue. It has been ack'd by upstream. |
| libyaml node id hardening.patch | (download) |
src/api.c |
7 6 + 1 - 0 ! |
cve-2013-6393: yaml_stack_extend: guard against integer overflow This is a hardening patch also from Florian Weimer <fweimer@redhat.com>. It is not required to fix this CVE however it improves the robustness of the code against future issues by avoiding large node ID's in a central place. |
| libyaml guard against overflows in indent and flow_level.patch | (download) |
src/scanner.c |
24 17 + 7 - 0 ! |
guard against overflows in indent and flow_level |
| CVE 2014 2525.patch | (download) |
src/scanner.c |
3 3 + 0 - 0 ! |
cve-2014-2525: heap overflow when parsing yaml tags The heap overflow is caused by not properly expanding a string before writing to it in function yaml_parser_scan_uri_escapes in scanner.c. |
| CVE 2014 9130.patch | (download) |
src/scanner.c |
7 0 + 7 - 0 ! |
cve-2014-9130: assert failure when processing wrapped strings |
1
