Public bug reported:

There is a new CVE for libyaml: 
https://security-tracker.debian.org/tracker/CVE-2014-9130
And a patch is already in the repository: 
https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2

The code in question is present at least in version 0.1.3 to 0.1.6 so
all lts versions are likely affected.

** Affects: libyaml (Ubuntu)
     Importance: Undecided
         Status: New

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libyaml in Ubuntu.
https://bugs.launchpad.net/bugs/1400736

Title:
  CVE-2014-9130 libyaml: denial-of-service/application crash with
  untrusted yaml input

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libyaml/+bug/1400736/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to