发布时间: 2025年6月6日
修改时间: 2025年6月6日
A vulnerability was found in TINITA YAML-LibYAML up to 0.902.x on Perl. It has been classified as problematic.CWE is classifying the issue as CWE-552. The product makes files or directories accessible to unauthorized actors, even though they should not be.This is going to have an impact on confidentiality.Upgrading to version 0.903.0 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
NVD | openEuler | |
---|---|---|
Confidentiality | High | |
Attack Vector | Network | |
CVSS评分 | N/A | 9.1 |
Attack Complexity | Low | |
Privileges Required | None | |
Scope | Unchanged | |
Integrity | High | |
User Interaction | None | |
Availability | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2025-2723 | perl-YAML-LibYAML security update | 2025年6月16日 |
产品 | 包 | 状态 |
---|---|---|
KY3.5.3 | perl-YAML-LibYAML | Fixed |
V6 | perl-YAML-LibYAML | Fixed |
KY3.4-5A | perl-YAML-LibYAML | Fixed |
KY3.5.2 | perl-YAML-LibYAML | Fixed |