MGASA-2014-0150

Source
https://advisories.mageia.org/MGASA-2014-0150.html
Import Source
https://advisories.mageia.org/MGASA-2014-0150.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0150
Related
Published
2014-04-03T00:33:14Z
Modified
2014-04-03T00:33:01Z
Summary
Updated libyaml package fixes security vulnerability
Details

Ivan Fratric of the Google Security Team discovered a heap-based buffer overflow vulnerability in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a specially-crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2014-2525).

References
Credits

Affected packages

Mageia:4 / yaml

Package

Name
yaml
Purl
pkg:rpm/mageia/yaml?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.1.6-1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / yaml

Package

Name
yaml
Purl
pkg:rpm/mageia/yaml?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.1.6-1.mga3

Ecosystem specific

{
    "section": "core"
}