Search for packages
| purl | pkg:deb/debian/libyaml-libyaml-perl@0.82%2Brepack-1?distro=trixie |
| Next non-vulnerable version | 0.86+ds-1+deb12u1 |
| Latest non-vulnerable version | 0.904.0+ds-1 |
| Risk | 4.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-6zxb-1pvy-yqcp
Aliases: CVE-2025-40908 |
A vulnerability has been discovered in YAML-LibYAML, which can lead to shell injection. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2gya-adz6-2qgf | Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function. |
CVE-2012-1152
|
| VCID-ft98-s9x5-byev | LibYAML, the library that libyaml provides bindings for is vulnerable to a heap-based buffer overflow when parsing YAML tags. |
CVE-2013-6393
GHSA-m75h-cghq-c8h5 |
| VCID-pkg9-61ah-kbex | security update |
CVE-2014-2525
GHSA-rffm-7xqq-h2v6 OSV-105027 |
| VCID-rj4z-edkc-pbdw | security update |
CVE-2014-9130
|