Amazon Linux 2 Security Advisory: ALAS2ECS-2026-103
Advisory Released Date: 2026-04-14
Advisory Updated Date: 2026-04-14
FAQs regarding Amazon Linux ALAS/CVE Severity
url.Parse insufficiently validated the host/authority component and accepted some invalid URLs. (CVE-2026-25679)
On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root. (CVE-2026-27139)
Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0. (CVE-2026-27142)
Affected Packages:
amazon-ecr-credential-helper
Note:
This advisory is applicable to Amazon Linux 2 - Ecs Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update amazon-ecr-credential-helper or yum update --advisory ALAS2ECS-2026-103 to update your system.
aarch64:
amazon-ecr-credential-helper-0.12.0-1.amzn2.aarch64
amazon-ecr-credential-helper-debuginfo-0.12.0-1.amzn2.aarch64
src:
amazon-ecr-credential-helper-0.12.0-1.amzn2.src
x86_64:
amazon-ecr-credential-helper-0.12.0-1.amzn2.x86_64
amazon-ecr-credential-helper-debuginfo-0.12.0-1.amzn2.x86_64