CVE-2016-5131

NameCVE-2016-5131
DescriptionUse-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-691-1, DSA-3637-1, DSA-3744-1
Debian Bugs840554

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml2 (PTS)buster2.9.4+dfsg1-7+deb10u4fixed
buster (security)2.9.4+dfsg1-7+deb10u6fixed
bullseye (security), bullseye2.9.10+dfsg-6.7+deb11u4fixed
bookworm2.9.14+dfsg-1.3~deb12u1fixed
sid, trixie2.9.14+dfsg-1.3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
chromium-browsersourcewheezy(unfixed)end-of-life
chromium-browsersourcejessie52.0.2743.82-1~deb8u1DSA-3637-1
chromium-browsersource(unstable)52.0.2743.82-1
libxml2sourcewheezy2.8.0+dfsg1-7+wheezy7DLA-691-1
libxml2sourcejessie2.9.1+dfsg1-5+deb8u4DSA-3744-1
libxml2source(unstable)2.9.4+dfsg1-2.1840554

Notes

[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
Google fix: https://codereview.chromium.org/2127493002
Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/9ab01a277d71f54d3143c2cf333c5c2e9aaedd9e
Requisite for the test: https://gitlab.gnome.org/GNOME/libxml2/-/commit/a005199330b86dada19d162cae15ef9bdcb6baa8

Search for package or bug name: Reporting problems