CVE-2017-10672

NameCVE-2017-10672
DescriptionUse-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh (attack range: remote)
Debian Bugs866676

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml-libxml-perl (PTS)wheezy, wheezy (security)2.0001+dfsg-1+deb7u1vulnerable
jessie (security), jessie2.0116+dfsg-1+deb8u1vulnerable
stretch2.0128+dfsg-1vulnerable
buster, sid2.0128+dfsg-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml-libxml-perlsource(unstable)(unfixed)high866676

Notes

https://rt.cpan.org/Public/Bug/Display.html?id=122246
Pull request: https://github.com/shlomif/perl-XML-LibXML/pull/9

Search for package or bug name: Reporting problems