ALAS2-2026-3230


Amazon Linux 2 Security Advisory: ALAS2-2026-3230
Advisory Released Date: 2026-04-14
Advisory Updated Date: 2026-04-14
Severity: Important

Issue Overview:

XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes.

A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes. (CVE-2006-10002)

XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack.

In the case (stackptr == stacksize - 1), the stack will NOT be expanded. Then the new value will be written at location (++stackptr), which equals stacksize and therefore falls just outside the allocated buffer.

The bug can be observed when parsing an XML file with very deep element nesting (CVE-2006-10003)


Affected Packages:

perl-XML-Parser


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update perl-XML-Parser or yum update --advisory ALAS2-2026-3230 to update your system.

New Packages:
aarch64:
    perl-XML-Parser-2.41-10.amzn2.0.3.aarch64
    perl-XML-Parser-debuginfo-2.41-10.amzn2.0.3.aarch64

i686:
    perl-XML-Parser-2.41-10.amzn2.0.3.i686
    perl-XML-Parser-debuginfo-2.41-10.amzn2.0.3.i686

src:
    perl-XML-Parser-2.41-10.amzn2.0.3.src

x86_64:
    perl-XML-Parser-2.41-10.amzn2.0.3.x86_64
    perl-XML-Parser-debuginfo-2.41-10.amzn2.0.3.x86_64