XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes.

A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

Apply the patch that has been publicly available since 2006-06-13 or upgrade to version 2.48 or later when it is released.


Workaround

Apply the patch that has been publicly available since 2006-06-13.

History

Thu, 19 Mar 2026 11:30:00 +0000

Type Values Removed Values Added
Description XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes. A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.
Title XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes
Weaknesses CWE-122
CWE-176
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-03-19T11:03:46.888Z

Reserved: 2026-03-16T22:47:45.685Z

Link: CVE-2006-10002

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-19T12:16:16.120

Modified: 2026-03-19T13:25:00.570

Link: CVE-2006-10002

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses