aboutsummaryrefslogtreecommitdiffstats
path: root/Library/Formula/libyaml.rb
diff options
context:
space:
mode:
authorTim D. Smith2015-01-12 16:26:00 -0800
committerTim D. Smith2015-01-12 16:40:40 -0800
commite943d42ee2cb2f081ed83d3e005092db21270c0c (patch)
tree88088131642acb21d12008217124bbfb3bba597e /Library/Formula/libyaml.rb
parent8c341058aa0d0cc2d973c42231679bc034d999e5 (diff)
downloadhomebrew-e943d42ee2cb2f081ed83d3e005092db21270c0c.tar.bz2
libyaml: patch for CVE-2014-9130
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9130 scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping. Closes #35796.
Diffstat (limited to 'Library/Formula/libyaml.rb')
-rw-r--r--Library/Formula/libyaml.rb8
1 files changed, 8 insertions, 0 deletions
diff --git a/Library/Formula/libyaml.rb b/Library/Formula/libyaml.rb
index a89e278ce..3efefd813 100644
--- a/Library/Formula/libyaml.rb
+++ b/Library/Formula/libyaml.rb
@@ -3,6 +3,7 @@ class Libyaml < Formula
url "http://pyyaml.org/download/libyaml/yaml-0.1.6.tar.gz"
mirror "https://mirrors.kernel.org/debian/pool/main/liby/libyaml/libyaml_0.1.6.orig.tar.gz"
sha1 "f3d404e11bec3c4efcddfd14c42d46f1aabe0b5d"
+ revision 1
bottle do
cellar :any
@@ -14,6 +15,13 @@ class Libyaml < Formula
option :universal
+ # address CVE-2014-9130
+ # https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9130
+ patch do
+ url "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2/raw/"
+ sha1 "174dbe1f5161853cdb1c6ba94df6a826cf25870c"
+ end
+
def install
ENV.universal_binary if build.universal?