Amazon Linux 2023 Security Advisory: ALAS2023-2026-1518
Advisory Released Date: 2026-04-01
Advisory Updated Date: 2026-04-01
FAQs regarding Amazon Linux ALAS/CVE Severity
A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing specially crafted XML content with empty external parameter entities. This could lead to a NULL pointer dereference, causing the application to crash and resulting in a Denial of Service (DoS). (CVE-2026-32776)
A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing specially crafted Document Type Definition (DTD) content. This could lead to an infinite loop during parsing, resulting in a Denial of Service (DoS) for the application using libexpat. (CVE-2026-32777)
A flaw was found in libexpat. This vulnerability allows an attacker to trigger a NULL pointer dereference in the `setContext` function. This occurs when the system attempts to retry an operation after an out-of-memory condition, which can lead to a Denial of Service (DoS) for the affected application. (CVE-2026-32778)
Affected Packages:
firefox
Issue Correction:
Run dnf update firefox --releasever 2023.10.20260330 or dnf update --advisory ALAS2023-2026-1518 --releasever 2023.10.20260330 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation
aarch64:
firefox-debuginfo-140.8.0-1.amzn2023.0.2.aarch64
firefox-140.8.0-1.amzn2023.0.2.aarch64
firefox-debugsource-140.8.0-1.amzn2023.0.2.aarch64
src:
firefox-140.8.0-1.amzn2023.0.2.src
x86_64:
firefox-debuginfo-140.8.0-1.amzn2023.0.2.x86_64
firefox-140.8.0-1.amzn2023.0.2.x86_64
firefox-debugsource-140.8.0-1.amzn2023.0.2.x86_64