| Name | CVE-2006-10002 |
| Description | XML::Parser versions through 2.45 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes. A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 378411 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| libxml-parser-perl (PTS) | bullseye | 2.46-2 | fixed |
| bullseye (security) | 2.46-2+deb11u1 | fixed | |
| bookworm | 2.46-4 | fixed | |
| bookworm (security) | 2.46-4+deb12u1 | fixed | |
| trixie | 2.47-1 | fixed | |
| trixie (security) | 2.47-2~deb13u1 | fixed | |
| forky, sid | 2.47-2 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| libxml-parser-perl | source | (unstable) | 2.46-1 | medium | 378411 |
https://lists.security.metacpan.org/cve-announce/msg/38106361/
https://rt.cpan.org/Ticket/Display.html?id=19859
https://github.com/cpan-authors/XML-Parser/issues/64
Fixed by: https://github.com/cpan-authors/XML-Parser/commit/56b0509dfc6b559cd7555ea81ee62e3622069255 (2.45)
Additional improvement: https://github.com/cpan-authors/XML-Parser/commit/5361c2b7f48599718cdecbe50c5fdd88b28ffd79 (2.48)
Issue was originally fixed in 2.34-4.2 but was lost with the 2.40-1 rebases.