CVE-2017-17497

NameCVE-2017-17497
DescriptionIn Tidy 5.7.0, the prvTidyTidyMetaCharset function in clean.c allows attackers to cause a denial of service (Segmentation Fault), because the currentNode variable in the "children of the head" processing feature is modified in the loop without validating the new value.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tidy-html5 (PTS)buster2:5.6.0-10fixed
sid, trixie, bookworm, bullseye2:5.6.0-11fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tidysource(unstable)(not affected)
tidy-html5sourcestretch(not affected)
tidy-html5source(unstable)2:5.6.0-3

Notes

[stretch] - tidy-html5 <not-affected> (Vulnerable code introduced after 5.6.0)
- tidy <not-affected> (Vulnerable code not present)
https://github.com/htacg/tidy-html5/issues/656
https://github.com/htacg/tidy-html5/commit/a111d7a9691953f903ffa1fdbc3762dec22fc215
Issue originally never in DEbian because teh vulnerable code was
introduced in 5.6.0. But with the 2:5.6.0-1 upload the package got
vulnerable and needed a targeted fix via 2:5.6.0-3 upload.

Search for package or bug name: Reporting problems