MGASA-2014-0040

Source
https://advisories.mageia.org/MGASA-2014-0040.html
Import Source
https://advisories.mageia.org/MGASA-2014-0040.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0040
Related
Published
2014-02-08T19:11:21Z
Modified
2014-02-08T19:11:18Z
Summary
Updated yaml packages fix CVE-2013-6393
Details

Updated libyaml packages fix security vulnerabilities:

Florian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially-crafted tag that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2013-6393).

References
Credits

Affected packages

Mageia:4 / yaml

Package

Name
yaml
Purl
pkg:rpm/mageia/yaml?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.1.5-1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / yaml

Package

Name
yaml
Purl
pkg:rpm/mageia/yaml?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.1.5-1.mga3

Ecosystem specific

{
    "section": "core"
}