Bug#1118230: bookworm-pu: package libyaml-syck-perl/1.34-2+deb12u1
Salvatore Bonaccorso
carnil at debian.org
Fri Oct 17 06:07:42 BST 2025
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: libyaml-syck-perl at packages.debian.org, Debian Perl Group <pkg-perl-maintainers at lists.alioth.debian.org>, gregor herrmann <gregoa at debian.org>, team at security.debian.org, carnil at debian.org
Control: affects -1 + src:libyaml-syck-perl
User: release.debian.org at packages.debian.org
Usertags: pu
Hi SRM,
[ Reason ]
libyaml-syck-perl in bookworm is affected by CVE-2025-11683 which does
not warrant a DSA.
[ Impact ]
Users remain vulnerable to the address memory corruption from
CVE-2025-11683.
[ Tests ]
Done explicitly with a test case triggering the issue. Additionally
run the autopkgtests on reverse dependencies as per
https://debusine.debian.net/debian/developers/work-request/207206/ .
[ Risks ]
It is upstream/cpan-authors patch merged and targeted for the fix. So
would say rather low.
[ Checklist ]
[x] *all* changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in (old)stable
[x] the issue is verified as fixed in unstable
Regards,
Salvatore
-------------- next part --------------
diff -Nru libyaml-syck-perl-1.34/debian/changelog libyaml-syck-perl-1.34/debian/changelog
--- libyaml-syck-perl-1.34/debian/changelog 2022-10-16 05:30:29.000000000 +0200
+++ libyaml-syck-perl-1.34/debian/changelog 2025-10-17 06:52:50.000000000 +0200
@@ -1,3 +1,11 @@
+libyaml-syck-perl (1.34-2+deb12u1) bookworm; urgency=medium
+
+ * Team upload.
+ * Address memory corruption leading to 'str' value being set on empty keys
+ (CVE-2025-11683)
+
+ -- Salvatore Bonaccorso <carnil at debian.org> Fri, 17 Oct 2025 06:52:50 +0200
+
libyaml-syck-perl (1.34-2) unstable; urgency=medium
[ Jenkins ]
diff -Nru libyaml-syck-perl-1.34/debian/patches/Address-memory-corruption-leading-to-str-value-being.patch libyaml-syck-perl-1.34/debian/patches/Address-memory-corruption-leading-to-str-value-being.patch
--- libyaml-syck-perl-1.34/debian/patches/Address-memory-corruption-leading-to-str-value-being.patch 1970-01-01 01:00:00.000000000 +0100
+++ libyaml-syck-perl-1.34/debian/patches/Address-memory-corruption-leading-to-str-value-being.patch 2025-10-17 06:52:50.000000000 +0200
@@ -0,0 +1,68 @@
+From: Timothy Legge <timlegge at gmail.com>
+Date: Thu, 9 Oct 2025 23:12:45 -0300
+Subject: Address memory corruption leading to 'str' value being set on empty
+ keys
+Origin: https://github.com/cpan-authors/YAML-Syck/commit/dcf4c8477b82ef439f43fd20dc099082d096df02
+Bug: https://github.com/cpan-authors/YAML-Syck/pull/65
+Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2025-11683
+
+When yaml is parsed, qstr is allocated
+
+In cases when the keys point to empty values there is no value
+
+copied to qstr and no null value is copied in
+---
+ perl_syck.h | 3 ---
+ token.c | 6 +++++-
+ 2 files changed, 5 insertions(+), 4 deletions(-)
+
+--- a/token.c
++++ b/token.c
+@@ -1552,6 +1552,7 @@ Plain:
+ int qidx = 0;
+ int qcapa = 100;
+ char *qstr = S_ALLOC_N( char, qcapa );
++ qstr[0] = '\0';
+ SyckLevel *plvl;
+ int parentIndent;
+
+@@ -1804,6 +1805,7 @@ SingleQuote:
+ int qidx = 0;
+ int qcapa = 100;
+ char *qstr = S_ALLOC_N( char, qcapa );
++ qstr[0] = '\0';
+
+ SingleQuote2:
+ YYTOKEN = YYCURSOR;
+@@ -1962,6 +1964,7 @@ DoubleQuote:
+ int qidx = 0;
+ int qcapa = 100;
+ char *qstr = S_ALLOC_N( char, qcapa );
++ qstr[0] = '\0';
+
+ DoubleQuote2:
+ YYTOKEN = YYCURSOR;
+@@ -2232,6 +2235,7 @@ TransferMethod:
+ int qidx = 0;
+ int qcapa = 100;
+ char *qstr = S_ALLOC_N( char, qcapa );
++ qstr[0] = '\0';
+
+ TransferMethod2:
+ YYTOKTMP = YYCURSOR;
+@@ -2450,6 +2454,7 @@ ScalarBlock:
+ SyckLevel *lvl = CURRENT_LEVEL();
+ int parentIndent = -1;
+
++ qstr[0] = '\0';
+ switch ( *yyt )
+ {
+ case '|': blockType = BLOCK_LIT; break;
+@@ -2472,7 +2477,6 @@ ScalarBlock:
+ }
+ }
+
+- qstr[0] = '\0';
+ YYTOKEN = YYCURSOR;
+
+ ScalarBlock2:
diff -Nru libyaml-syck-perl-1.34/debian/patches/series libyaml-syck-perl-1.34/debian/patches/series
--- libyaml-syck-perl-1.34/debian/patches/series 2022-10-16 05:30:29.000000000 +0200
+++ libyaml-syck-perl-1.34/debian/patches/series 2025-10-17 06:52:50.000000000 +0200
@@ -1 +1,2 @@
disable-compiler-check.patch
+Address-memory-corruption-leading-to-str-value-being.patch
More information about the pkg-perl-maintainers
mailing list