openSUSE Security Update : perl-YAML-LibYAML (openSUSE-2015-162)

Medium Nessus Plugin ID 81417

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote openSUSE host is missing a security update.

Description

perl-YAML-LibYAML was updated to version 0.59 to fix four security issues.

These security issues were fixed :

- CVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allowed remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow (bnc#860617, bnc#911782).

- CVE-2012-1152: Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allowed remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function (bnc#751503).

- CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allowed context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping (bnc#907809, bnc#911782).

- CVE-2014-2525: Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allowed context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file (bnc#868944, bnc#911782).

These non-security issues were fixed :

- PR/23 Better scalar dump heuristics

- More closely match YAML.pm

- Add a VERSION statement to YAML::LibYAML (issue#8)

- Applied fix for PR/21. nawglan++

- Use Swim cpan-tail block functions in doc

- Get YAML::XS using latest libyaml

- Fix for https://bitbucket.org/xi/libyaml/issue/10/wrapped-string s-cause-assert-failure

- Fix e1 test failure on 5.21.4

- Remove =travis section

- Meta 0.0.2

- Eliminate spurious trailing whitespace

- Add t/000-compile-modules.t

- Fix swim errors

- Add badges to doc

- Fix ReadMe

- Fix Meta and add Contributing.

- Doc fix. GitHub-Issue-#6. Thanks to Debian Perl Group for finding this.

- Test::Base tests needed 'inc' in @INC

- Switch to Zilla::Dist

- No longer dep on Test::Base, Spiffy, and Filter::Util::Call

- Remove test/changes.t

- Removed another C++ // style comment. jdb++

- Removed C++ // style comments, for better portability.
jdb++

- Using the latest libyaml codebase

- https://github.com/yaml/libyaml/tree/perl-yaml-xs

- Changes have been made to start moving libyaml to 1.2

Solution

Update the affected perl-YAML-LibYAML packages.

See Also

http://www.nessus.org/u?82d71510

https://bugzilla.opensuse.org/show_bug.cgi?id=751503

https://bugzilla.opensuse.org/show_bug.cgi?id=860617

https://bugzilla.opensuse.org/show_bug.cgi?id=868944

https://bugzilla.opensuse.org/show_bug.cgi?id=907809

https://bugzilla.opensuse.org/show_bug.cgi?id=911782

https://github.com/yaml/libyaml/tree/perl-yaml-xs

Plugin Details

Severity: Medium

ID: 81417

File Name: openSUSE-2015-162.nasl

Version: 1.3

Type: local

Agent: unix

Published: 2015/02/20

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 5.9

CVSS v2.0

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:perl-YAML-LibYAML, p-cpe:/a:novell:opensuse:perl-YAML-LibYAML-debuginfo, p-cpe:/a:novell:opensuse:perl-YAML-LibYAML-debugsource, cpe:/o:novell:opensuse:13.1, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2015/02/11

Reference Information

CVE: CVE-2012-1152, CVE-2013-6393, CVE-2014-2525, CVE-2014-9130