CVE-2015-3451

NameCVE-2015-3451
DescriptionThe _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-214-1, DSA-3243-1
Debian Bugs783443

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml-libxml-perl (PTS)bullseye2.0134+dfsg-2fixed
bookworm2.0207+dfsg+really+2.0134-1fixed
sid, trixie2.0207+dfsg+really+2.0134-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml-libxml-perlsourcesqueeze1.70.ds-1+deb6u1DLA-214-1
libxml-libxml-perlsourcewheezy2.0001+dfsg-1+deb7u1DSA-3243-1
libxml-libxml-perlsourcejessie2.0116+dfsg-1+deb8u1DSA-3243-1
libxml-libxml-perlsource(unstable)2.0116+dfsg-2783443

Notes

https://www.openwall.com/lists/oss-security/2015/04/25/2
https://bitbucket.org/shlomif/perl-xml-libxml/commits/5962fd067580767777e94640b129ae8930a68a30
https://bitbucket.org/shlomif/perl-xml-libxml/commits/915f1dbaf21c5f3c21d7c519c70fd93859e47152

Search for package or bug name: Reporting problems