YAML::Syck versions through 1.36 for Perl has several potential security vulnerabilities including a high-severity heap buffer overflow in the YAML emitter.
The heap overflow occurs when class names exceed the initial 512-byte allocation.
The base64 decoder could read past the buffer end on trailing newlines.
strtok mutated n->type_id in place, corrupting shared node data.
A memory leak occurred in syck_hdlr_add_anchor when a node already had an anchor. The incoming anchor string 'a' was leaked on early return.
References
| Link | Resource |
|---|---|
| https://github.com/cpan-authors/YAML-Syck/commit/e8844a31c8cf0052914b198fc784ed4e6b8ae69e.patch | Patch |
| https://metacpan.org/release/TODDR/YAML-Syck-1.37_01/changes#L21 | Release Notes |
| http://www.openwall.com/lists/oss-security/2026/03/16/6 | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-16 23:16
Updated : 2026-03-23 18:17
NVD link : CVE-2026-4177
Mitre link : CVE-2026-4177
CVE.ORG link : CVE-2026-4177
JSON object : View
Products Affected
toddr
- yaml\
CWE
CWE-122
Heap-based Buffer Overflow
