Lucene search

K
mageiaGentoo FoundationMGASA-2014-0040
HistoryFeb 08, 2014 - 11:11 p.m.

Updated yaml packages fix CVE-2013-6393

2014-02-0823:11:21
Gentoo Foundation
advisories.mageia.org
13

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.031 Low

EPSS

Percentile

90.9%

Updated libyaml packages fix security vulnerabilities: Florian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially-crafted tag that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2013-6393).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchyaml< 0.1.5-1yaml-0.1.5-1.mga3
Mageia4noarchyaml< 0.1.5-1yaml-0.1.5-1.mga4

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.031 Low

EPSS

Percentile

90.9%