{"id":"MGASA-2014-0150","summary":"Updated libyaml package fixes security vulnerability","details":"Ivan Fratric of the Google Security Team discovered a heap-based buffer\noverflow vulnerability in LibYAML, a fast YAML 1.1 parser and emitter\nlibrary. A remote attacker could provide a specially-crafted YAML document\nthat, when parsed by an application using libyaml, would cause the\napplication to crash or, potentially, execute arbitrary code with the\nprivileges of the user running the application (CVE-2014-2525).\n","modified":"2026-02-01T20:22:02.965223Z","published":"2014-04-03T00:33:14Z","related":["CVE-2014-2525"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0150.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=13101"},{"type":"REPORT","url":"http://www.debian.org/security/2014/dsa-2884"}],"affected":[{"package":{"name":"yaml","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/yaml?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.1.6-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0150.json"}},{"package":{"name":"yaml","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/yaml?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.1.6-1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0150.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}