[From nobody Tue May  5 15:35:07 2026
Received: (at submit) by bugs.debian.org; 29 Apr 2026 18:52:29 +0000
X-Spam-Checker-Version: SpamAssassin 4.0.1-bugs.debian.org_2005_01_02
 (2024-03-25) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-10.0 required=4.0 tests=BAYES_00,FROMDEVELOPER,
 NO_RELAYS,XMAILER_REPORTBUG autolearn=ham autolearn_force=no
 version=4.0.1-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 22; hammy, 149; neutral, 65; spammy,
 1. spammytokens:0.942-+--H*r:bugs.debian.org
 hammytokens:0.000-+--H*F:U*carnil, 0.000-+--XDebbugsCc,
 0.000-+--X-Debbugs-Cc, 0.000-+--HTo:N*Debian, 0.000-+--H*Ad:N*Bug
Return-path: &lt;carnil@debian.org&gt;
Received: via submission by buxtehude.debian.org with esmtp (Exim 4.96)
 (envelope-from &lt;carnil@debian.org&gt;) id 1wIA1L-00CVVi-2C
 for submit@bugs.debian.org; Wed, 29 Apr 2026 18:52:29 +0000
Content-Type: text/plain; charset=&quot;us-ascii&quot;
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Salvatore Bonaccorso &lt;carnil@debian.org&gt;
To: Debian Bug Tracking System &lt;submit@bugs.debian.org&gt;
Subject: libtext-csv-xs-perl: CVE-2026-7111
Message-ID: &lt;177748874661.1280257.15620727062674275746.reportbug@eldamar.lan&gt;
X-Mailer: reportbug 13.2.0
Date: Wed, 29 Apr 2026 20:52:26 +0200
Delivered-To: submit@bugs.debian.org

Source: libtext-csv-xs-perl
Version: 1.61-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/cpan-authors/Text-CSV_XS/issues/65
X-Debbugs-Cc: carnil@debian.org, Debian Security Team &lt;team@security.debian.org&gt;

Hi,

The following vulnerability was published for libtext-csv-xs-perl.

CVE-2026-7111[0]:
| Text::CSV_XS versions before 1.62 for Perl have a use-after-free
| when registered callbacks extend the Perl argument stack, which may
| enable type confusion or memory corruption.  The Parse, print,
| getline, and getline_all methods invoke registered callbacks (for
| example after_parse, before_print, or on_error) and cache the Perl
| argument stack pointer across the call. If a callback extends the
| argument stack enough to trigger a reallocation, the return value is
| written through the stale pointer into the freed buffer, and the
| caller reads the original $self argument as the return value
| instead.  Calling code that expects parsed data from getline_all
| receives the Text::CSV_XS object in its place, leading to logic
| errors or crashes. Text::CSV_XS objects used without any registered
| callbacks are not affected.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities &amp; Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-7111
    https://www.cve.org/CVERecord?id=CVE-2026-7111
[1] https://github.com/cpan-authors/Text-CSV_XS/issues/65
[2] https://lists.security.metacpan.org/cve-announce/msg/39453344/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
]