yaml-cpp0.3, yaml-cpp
2018-01-15 14:49
CVE-2017-5950 yaml-cpp0.3
CVE-2017-5950 yaml-cpp
2017-10-23 14:17
2017-09-08 06:03
2017-07-20 21:30
2017-06-16 19:22
2017-05-10 23:46
2017-04-14 10:20
2017-04-04 02:03


The SingleDocParser::HandleNode function in yaml-cpp (aka LibYaml-C++) 0.5.3 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
artful yaml-cpp None
yaml-cpp0.3 None
devel yaml-cpp None
yaml-cpp0.3 None
trusty yaml-cpp None
yaml-cpp0.3 None
upstream yaml-cpp None
yaml-cpp0.3 None
xenial yaml-cpp None
yaml-cpp0.3 None


Release Package Reason
precise yaml-cpp0.3 DNE
yaml-cpp DNE
precise/esm yaml-cpp0.3 DNE
yaml-cpp DNE
vivid/stable-phone-overlay yaml-cpp0.3 DNE
yaml-cpp DNE
vivid/ubuntu-core yaml-cpp0.3 DNE
yaml-cpp DNE
yakkety yaml-cpp0.3 ignored
yaml-cpp ignored
zesty yaml-cpp0.3 ignored
yaml-cpp ignored