DescriptionIn Tidy 5.7.0, the prvTidyTidyMetaCharset function in clean.c allows attackers to cause a denial of service (Segmentation Fault), because the currentNode variable in the "children of the head" processing feature is modified in the loop without validating the new value.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tidy-html5 (PTS)buster2:5.6.0-10fixed
bookworm, bullseye, sid, trixie2:5.6.0-11fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tidysource(unstable)(not affected)
tidy-html5sourcestretch(not affected)


[stretch] - tidy-html5 <not-affected> (Vulnerable code introduced after 5.6.0)
- tidy <not-affected> (Vulnerable code not present)
Issue originally never in DEbian because teh vulnerable code was
introduced in 5.6.0. But with the 2:5.6.0-1 upload the package got
vulnerable and needed a targeted fix via 2:5.6.0-3 upload.

Search for package or bug name: Reporting problems