Follow @Openwall on Twitter for new release announcements and other news
[<prev] [<thread-prev] [day] [month] [year] [list]
Message-ID: <acBZuNK969JYpCu-@eldamar.lan>
Date: Sun, 22 Mar 2026 22:06:00 +0100
From: Salvatore Bonaccorso <carnil@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2006-10002: XML::Parser versions through 2.47
 for Perl could overflow the pre-allocated buffer size cause a heap
 corruption (double free or corruption) and crashes

Hi,

On Thu, Mar 19, 2026 at 08:06:17AM -0300, Timothy Legge wrote:
> ========================================================================
> CVE-2006-10002                                       CPAN Security Group
> ========================================================================
> 
>         CVE ID:  CVE-2006-10002
>   Distribution:  XML-Parser
>       Versions:  through 2.47
> 
>       MetaCPAN:  https://metacpan.org/dist/XML-Parser
>       VCS Repo:  http://github.com/toddr/XML-Parser
> 
> 
> XML::Parser versions through 2.47 for Perl could overflow the
> pre-allocated buffer size cause a heap corruption (double free or
> corruption) and crashes
> 
> Description
> -----------
> XML::Parser versions through 2.47 for Perl could overflow the
> pre-allocated buffer size cause a heap corruption (double free or
> corruption) and crashes.
> 
> A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML
> input buffer because Perl's read() returns decoded characters while
> SvPV() gives back multi-byte UTF-8 bytes that can exceed the
> pre-allocated buffer size. This can cause heap corruption (double free
> or corruption) and crashes.
> 
> Problem types
> -------------
> - CWE-122 Heap-based Buffer Overflow
> - CWE-176 Improper Handling of Unicode Encoding
> 
> Workarounds
> -----------
> Apply the patch that has been publicly available since 2006-06-13.
> 
> 
> Solutions
> ---------
> Apply the patch that has been publicly available since 2006-06-13 or
> upgrade to version 2.48 or later when it is released.
> 
> 
> References
> ----------
> https://rt.cpan.org/Ticket/Display.html?id=19859
> https://github.com/cpan-authors/XML-Parser/issues/64
> https://github.com/cpan-authors/XML-Parser/commit/6b291f4d260fc124a6ec80382b87a918f372bc6b.patch
> 
> Timeline
> --------
> - 2006-06-13: Issue logged in Request Tracker for XML::Parser
> - 2006-08-11: Patch provided in Request Tracker for XML::Parser
> - 2019-09-24: Issue migrated to github issue tracker
> - 2019-09-24: Patch provided in github issue tracker
> - 2026-03-16: PR created and commit merged to git repo

An update on this one, it was later assessed that this was fixed
earlier already in 2.45, with
https://github.com/cpan-authors/XML-Parser/commit/56b0509dfc6b559cd7555ea81ee62e3622069255
(so the CVE record got update, thanks Timothy).

Regards,
Salvatore

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.