CVE-2017-10672

NameCVE-2017-10672
DescriptionUse-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1171-1, DSA-4042-1
Debian Bugs866676

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml-libxml-perl (PTS)buster2.0134+dfsg-1fixed
bullseye2.0134+dfsg-2fixed
sid, trixie, bookworm2.0207+dfsg+really+2.0134-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml-libxml-perlsourcewheezy2.0001+dfsg-1+deb7u2DLA-1171-1
libxml-libxml-perlsourcejessie2.0116+dfsg-1+deb8u2DSA-4042-1
libxml-libxml-perlsourcestretch2.0128+dfsg-1+deb9u1DSA-4042-1
libxml-libxml-perlsource(unstable)2.0128+dfsg-5866676

Notes

https://rt.cpan.org/Public/Bug/Display.html?id=122246
Pull request: https://github.com/shlomif/perl-XML-LibXML/pull/8

Search for package or bug name: Reporting problems