Bug 2449001 (CVE-2006-10002) - CVE-2006-10002 perl-xml-parser: XML::Parser for Perl: Heap corruption and denial of service from crafted XML input
Summary: CVE-2006-10002 perl-xml-parser: XML::Parser for Perl: Heap corruption and den...
Keywords:
Status: NEW
Alias: CVE-2006-10002
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2449268 2449270 2449271 2449269
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-19 12:02 UTC by OSIDB Bzimport
Modified: 2026-03-31 15:23 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-19 12:02:10 UTC
XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes.

A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.


Note You need to log in before you can comment on or make changes to this bug.