{"id":"MGASA-2014-0040","summary":"Updated yaml packages fix CVE-2013-6393","details":"Updated libyaml packages fix security vulnerabilities:\n\nFlorian Weimer of the Red Hat Product Security Team discovered a heap-based\nbuffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library.\nA remote attacker could provide a YAML document with a specially-crafted tag\nthat, when parsed by an application using libyaml, would cause the application\nto crash or, potentially, execute arbitrary code with the privileges of the\nuser running the application (CVE-2013-6393).\n","modified":"2026-04-16T06:24:09.476621297Z","published":"2014-02-08T19:11:21Z","upstream":["CVE-2013-6393"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0040.html"},{"type":"WEB","url":"http://www.debian.org/security/2014/dsa-2850"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=12583"}],"affected":[{"package":{"name":"yaml","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/yaml?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.1.5-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0040.json"}},{"package":{"name":"yaml","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/yaml?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.1.5-1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0040.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}