-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4525-1                [email protected]
https://www.debian.org/lts/security/                       Andrej Shadura
April 09, 2026                                https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : libyaml-syck-perl
Version        : 1.34-1+deb11u1
CVE ID         : CVE-2025-11683 CVE-2026-4177

Brief introduction 

CVE-2025-11683

    Missing null terminators in token.c leads to but-of-bounds read
    which allows adjacent variable to be read. The issue is seen with
    complex YAML files with a hash of all keys and empty values.

CVE-2026-4177

    Several security vulnerabilities including a high-severity heap
    buffer overflow in the YAML emitter. The heap overflow occurs when
    class names exceed the initial 512-byte allocation. The base64
    decoder could read past the buffer end on trailing newlines. strtok
    mutated n->type_id in place, corrupting shared node data. A memory
    leak occurred in syck_hdlr_add_anchor when a node already had an
    anchor. The incoming anchor string 'a' was leaked on early return.

For Debian 11 bullseye, these problems have been fixed in version
1.34-1+deb11u1.

We recommend that you upgrade your libyaml-syck-perl packages.

For the detailed security status of libyaml-syck-perl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libyaml-syck-perl

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iHQEARYKAB0WIQSD3NF/RLIsyDZW7aHoRGtKyMdyYQUCadfx2QAKCRDoRGtKyMdy
YbyLAPjLsmn1l3CEvsNUA4bCu4FFC7+VXlkMXke9X+PT2IkZAQDa+5V0l4u5IvfL
HF0AOiI2xSlmncvQpkNjWLqwAJ+KCA==
=fg02
-----END PGP SIGNATURE-----

Reply via email to