Home

Description

YAML::Syck versions through 1.36 for Perl has several potential security vulnerabilities including a high-severity heap buffer overflow in the YAML emitter. The heap overflow occurs when class names exceed the initial 512-byte allocation. The base64 decoder could read past the buffer end on trailing newlines. strtok mutated n->type_id in place, corrupting shared node data. A memory leak occurred in syck_hdlr_add_anchor when a node already had an anchor. The incoming anchor string 'a' was leaked on early return.

PUBLISHED Reserved 2026-03-14 | Published 2026-03-16 | Updated 2026-03-17 | Assigner CPANSec

Problem types

CWE-122 Heap-based Buffer Overflow

Product status

Default status
unaffected

Any version
affected

Credits

Todd Rinaldo finder

References

www.openwall.com/lists/oss-security/2026/03/16/6

github.com/...e8844a31c8cf0052914b198fc784ed4e6b8ae69e.patch patch

metacpan.org/release/TODDR/YAML-Syck-1.37_01/changes release-notes

cve.org (CVE-2026-4177)

nvd.nist.gov (CVE-2026-4177)

Download JSON