diff options
| author | Tim D. Smith | 2015-01-12 16:26:00 -0800 |
|---|---|---|
| committer | Tim D. Smith | 2015-01-12 16:40:40 -0800 |
| commit | e943d42ee2cb2f081ed83d3e005092db21270c0c (patch) | |
| tree | 88088131642acb21d12008217124bbfb3bba597e /Library/Formula/libyaml.rb | |
| parent | 8c341058aa0d0cc2d973c42231679bc034d999e5 (diff) | |
| download | homebrew-e943d42ee2cb2f081ed83d3e005092db21270c0c.tar.bz2 | |
libyaml: patch for CVE-2014-9130
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9130
scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka
YAML-XS) module for Perl, allows context-dependent attackers to cause a
denial of service (assertion failure and crash) via vectors involving
line-wrapping.
Closes #35796.
Diffstat (limited to 'Library/Formula/libyaml.rb')
| -rw-r--r-- | Library/Formula/libyaml.rb | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/Library/Formula/libyaml.rb b/Library/Formula/libyaml.rb index a89e278ce..3efefd813 100644 --- a/Library/Formula/libyaml.rb +++ b/Library/Formula/libyaml.rb @@ -3,6 +3,7 @@ class Libyaml < Formula url "http://pyyaml.org/download/libyaml/yaml-0.1.6.tar.gz" mirror "https://mirrors.kernel.org/debian/pool/main/liby/libyaml/libyaml_0.1.6.orig.tar.gz" sha1 "f3d404e11bec3c4efcddfd14c42d46f1aabe0b5d" + revision 1 bottle do cellar :any @@ -14,6 +15,13 @@ class Libyaml < Formula option :universal + # address CVE-2014-9130 + # https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9130 + patch do + url "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2/raw/" + sha1 "174dbe1f5161853cdb1c6ba94df6a826cf25870c" + end + def install ENV.universal_binary if build.universal? |
