CVE-2017-10672

NameCVE-2017-10672
DescriptionUse-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1171-1, DSA-4042-1
NVD severityhigh (attack range: remote)
Debian Bugs866676

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml-libxml-perl (PTS)wheezy2.0001+dfsg-1+deb7u1vulnerable
wheezy (security)2.0001+dfsg-1+deb7u2fixed
jessie2.0116+dfsg-1+deb8u1vulnerable
jessie (security)2.0116+dfsg-1+deb8u2fixed
stretch2.0128+dfsg-1vulnerable
stretch (security)2.0128+dfsg-1+deb9u1fixed
buster, sid2.0128+dfsg-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml-libxml-perlsource(unstable)2.0128+dfsg-5high866676
libxml-libxml-perlsourcejessie2.0116+dfsg-1+deb8u2highDSA-4042-1
libxml-libxml-perlsourcestretch2.0128+dfsg-1+deb9u1highDSA-4042-1
libxml-libxml-perlsourcewheezy2.0001+dfsg-1+deb7u2highDLA-1171-1

Notes

https://rt.cpan.org/Public/Bug/Display.html?id=122246
Pull request: https://github.com/shlomif/perl-XML-LibXML/pull/8

Search for package or bug name: Reporting problems