Unrated severityNVD Advisory· Published Mar 19, 2026· Updated Apr 29, 2026
XML::Parser versions through 2.45 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes
CVE-2006-10002
Description
XML::Parser versions through 2.45 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes.
A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.
Affected products
2- Range: <=2.41
- TODDR/XML::Parserv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/cpan-authors/XML-Parser/commit/56b0509dfc6b559cd7555ea81ee62e3622069255.patchmitrepatch
- github.com/cpan-authors/XML-Parser/issues/64mitreissue-tracking
- metacpan.org/release/TODDR/XML-Parser-2.46/changesmitrerelease-notes
- rt.cpan.org/Ticket/Display.htmlmitreissue-tracking
News mentions
0No linked articles in our index yet.