ALAS2-2026-3219


Amazon Linux 2 Security Advisory: ALAS2-2026-3219
Advisory Released Date: 2026-04-01
Advisory Updated Date: 2026-04-01
Severity: Medium

Issue Overview:

A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing specially crafted XML content with empty external parameter entities. This could lead to a NULL pointer dereference, causing the application to crash and resulting in a Denial of Service (DoS). (CVE-2026-32776)

A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing specially crafted Document Type Definition (DTD) content. This could lead to an infinite loop during parsing, resulting in a Denial of Service (DoS) for the application using libexpat. (CVE-2026-32777)

A flaw was found in libexpat. This vulnerability allows an attacker to trigger a NULL pointer dereference in the `setContext` function. This occurs when the system attempts to retry an operation after an out-of-memory condition, which can lead to a Denial of Service (DoS) for the affected application. (CVE-2026-32778)


Affected Packages:

thunderbird


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update thunderbird or yum update --advisory ALAS2-2026-3219 to update your system.

New Packages:
aarch64:
    thunderbird-140.8.0-1.amzn2.0.2.aarch64

src:
    thunderbird-140.8.0-1.amzn2.0.2.src

x86_64:
    thunderbird-140.8.0-1.amzn2.0.2.x86_64