YAML-LibYAML: Shell injection — GLSA 202506-11

A vulnerability has been discovered in YAML-LibYAML, which can lead to shell injection.

Affected packages

dev-perl/YAML-LibYAML on all architectures
Affected versions < 0.903.0
Unaffected versions >= 0.903.0

Background

YAML-LibYAML provides YAML Serialization using XS and libyaml for Perl.

Description

YAML-LibYAML uses the legacy '2-arg' open() call which is susceptible to shell injection via malicious filenames.

Impact

Shell injection may be used to execute arbitrary code using a malicious filename.

Workaround

There is no known workaround at this time.

Resolution

All YAML-LibYAML users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-perl/YAML-LibYAML-0.903.0"
 

References

Release date
June 12, 2025

Latest revision
June 12, 2025: 1

Severity
normal

Exploitable
local and remote

Bugzilla entries