Amazon Linux 2 Security Advisory: ALAS2FIREFOX-2026-055
Advisory Released Date: 2026-04-01
Advisory Updated Date: 2026-04-01
FAQs regarding Amazon Linux ALAS/CVE Severity
A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing specially crafted XML content with empty external parameter entities. This could lead to a NULL pointer dereference, causing the application to crash and resulting in a Denial of Service (DoS). (CVE-2026-32776)
A flaw was found in libexpat. A remote attacker could exploit this vulnerability by providing specially crafted Document Type Definition (DTD) content. This could lead to an infinite loop during parsing, resulting in a Denial of Service (DoS) for the application using libexpat. (CVE-2026-32777)
A flaw was found in libexpat. This vulnerability allows an attacker to trigger a NULL pointer dereference in the `setContext` function. This occurs when the system attempts to retry an operation after an out-of-memory condition, which can lead to a Denial of Service (DoS) for the affected application. (CVE-2026-32778)
Affected Packages:
firefox
Note:
This advisory is applicable to Amazon Linux 2 - Firefox Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update firefox or yum update --advisory ALAS2FIREFOX-2026-055 to update your system.
aarch64:
firefox-140.8.0-1.amzn2.0.2.aarch64
src:
firefox-140.8.0-1.amzn2.0.2.src
x86_64:
firefox-140.8.0-1.amzn2.0.2.x86_64