Amazon Linux 2 Security Advisory: ALAS2-2026-3230
Advisory Released Date: 2026-04-14
Advisory Updated Date: 2026-04-14
XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes.
A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes. (CVE-2006-10002)
XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack.
In the case (stackptr == stacksize - 1), the stack will NOT be expanded. Then the new value will be written at location (++stackptr), which equals stacksize and therefore falls just outside the allocated buffer.
The bug can be observed when parsing an XML file with very deep element nesting (CVE-2006-10003)
Affected Packages:
perl-XML-Parser
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update perl-XML-Parser or yum update --advisory ALAS2-2026-3230 to update your system.
aarch64:
perl-XML-Parser-2.41-10.amzn2.0.3.aarch64
perl-XML-Parser-debuginfo-2.41-10.amzn2.0.3.aarch64
i686:
perl-XML-Parser-2.41-10.amzn2.0.3.i686
perl-XML-Parser-debuginfo-2.41-10.amzn2.0.3.i686
src:
perl-XML-Parser-2.41-10.amzn2.0.3.src
x86_64:
perl-XML-Parser-2.41-10.amzn2.0.3.x86_64
perl-XML-Parser-debuginfo-2.41-10.amzn2.0.3.x86_64