CVE-2026-4177

EUVD-2026-12523
YAML::Syck versions through 1.36 for Perl has several potential security vulnerabilities including a high-severity heap buffer overflow in the YAML emitter.

The heap overflow occurs when class names exceed the initial 512-byte allocation.

The base64 decoder could read past the buffer end on trailing newlines.

strtok mutated n->type_id in place, corrupting shared node data.

A memory leak occurred in syck_hdlr_add_anchor when a node already had an anchor. The incoming anchor string 'a' was leaked on early return.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 7%
Affected Products (NVD)
VendorProductVersion
toddryaml\
𝑥
< 1.37
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libyaml-syck-perl
bookworm
vulnerable
bookworm (security)
1.34-2+deb12u2
fixed
bullseye
vulnerable
bullseye (security)
1.34-1+deb11u1
fixed
forky
1.36-2
fixed
sid
1.36-2
fixed
trixie
vulnerable
trixie (security)
1.34-2+deb13u2
fixed