Bug 1122004 - (CVE-2019-6285) VUL-1: CVE-2019-6285: yaml-cpp: The SingleDocParser::HandleFlowSequence function in cpp allows remote attackers to cause DOS via a crafted YAML file
(CVE-2019-6285)
VUL-1: CVE-2019-6285: yaml-cpp: The SingleDocParser::HandleFlowSequence funct...
Status: RESOLVED FIXED
: CVE-2018-20710 (view as bug list)
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Normal
: ---
Assigned To: Stanislav Brabec
Security Team bot
https://smash.suse.de/issue/222773/
CVSSv3:SUSE:CVE-2019-6285:5.3:(AV:N/A...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-01-15 13:43 UTC by Alexandros Toptsoglou
Modified: 2022-05-16 15:07 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexandros Toptsoglou 2019-01-15 13:43:58 UTC
CVE-2019-6285

The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++)
0.6.2 allows remote attackers to cause a denial of service (stack consumption
and application crash) via a crafted YAML file.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6285
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-6285.html
http://www.cvedetails.com/cve/CVE-2019-6285/
https://github.com/jbeder/yaml-cpp/issues/660
Comment 1 Alexandros Toptsoglou 2019-01-15 13:53:16 UTC
The vulnerable function as it is now was introduced in commit 9b4db068bb06134e35b8a00085252d2ea5bf2fbc [1] which is contained to all versions from 0.5.2 till the current (0.6.2). SLE12-SP2 and SLE15 with versions 0.5.3 and 0.6.1 respectively should be affected. 

No fix is yet available in the upstream.This means that this is an open issue[2].    
A POC is available at [3]

[1] https://github.com/jbeder/yaml-cpp/commit/9b4db068bb06134e35b8a00085252d2ea5bf2fbc
[2] https://github.com/jbeder/yaml-cpp/issues/660
[3] https://github.com/jbeder/yaml-cpp/files/2754280/crash0.zip
Comment 2 Alexandros Toptsoglou 2019-04-16 15:24:35 UTC
*** Bug 1129245 has been marked as a duplicate of this bug. ***
Comment 3 Kristyna Streitova 2021-03-25 18:36:42 UTC
Upstream patch: https://github.com/jbeder/yaml-cpp/pull/807
Comment 6 Stanislav Brabec 2022-03-21 01:19:58 UTC
Requests were accepted, release is in progress.
https://maintenance.suse.de/request/261354/
Comment 7 Gianluca Gabrielli 2022-03-21 09:50:12 UTC
same as bsc#1121227#c6 [0].

[0] https://bugzilla.suse.com/show_bug.cgi?id=1121227#c6
Comment 8 Swamp Workflow Management 2022-04-01 13:16:58 UTC
SUSE-SU-2022:1072-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 1121227,1121230,1122004,1122021
CVE References: CVE-2018-20573,CVE-2018-20574,CVE-2019-6285,CVE-2019-6292
JIRA References: 
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP5 (src):    yaml-cpp-0.5.3-3.6.3

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Swamp Workflow Management 2022-04-01 13:17:40 UTC
openSUSE-SU-2022:1073-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 1121227,1121230,1122004,1122021
CVE References: CVE-2018-20573,CVE-2018-20574,CVE-2019-6285,CVE-2019-6292
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    yaml-cpp-0.6.1-4.5.1
Comment 10 Swamp Workflow Management 2022-04-01 13:19:14 UTC
SUSE-SU-2022:1073-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 1121227,1121230,1122004,1122021
CVE References: CVE-2018-20573,CVE-2018-20574,CVE-2019-6285,CVE-2019-6292
JIRA References: 
Sources used:
SUSE Linux Enterprise Realtime Extension 15-SP2 (src):    yaml-cpp-0.6.1-4.5.1
SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (src):    yaml-cpp-0.6.1-4.5.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    yaml-cpp-0.6.1-4.5.1
SUSE Linux Enterprise Micro 5.1 (src):    yaml-cpp-0.6.1-4.5.1
SUSE Linux Enterprise Micro 5.0 (src):    yaml-cpp-0.6.1-4.5.1
SUSE Linux Enterprise Installer 15-SP2 (src):    yaml-cpp-0.6.1-4.5.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Stanislav Brabec 2022-04-09 00:33:22 UTC
I did not prepare the previous update, so I don't have an insight. I hope that it is sufficient to apply the same patch as SP3 has.

Submitted to SLE15 SP4 GA: https://build.suse.de/request/show/269442
Comment 12 Swamp Workflow Management 2022-04-13 19:28:20 UTC
SUSE-SU-2022:1073-2: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 1121227,1121230,1122004,1122021
CVE References: CVE-2018-20573,CVE-2018-20574,CVE-2019-6285,CVE-2019-6292
JIRA References: 
Sources used:
SUSE Linux Enterprise Micro 5.2 (src):    yaml-cpp-0.6.1-4.5.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Stanislav Brabec 2022-05-16 15:07:54 UTC
I hope it is completely fixed now.