CVE-2017-17497

NameCVE-2017-17497
DescriptionIn Tidy 5.7.0, the prvTidyTidyMetaCharset function in clean.c allows attackers to cause a denial of service (Segmentation Fault), because the currentNode variable in the "children of the head" processing feature is modified in the loop without validating the new value.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tidy (PTS)jessie (security), jessie20091223cvs-1.4+deb8u1fixed
tidy-html5 (PTS)stretch1:5.2.0-2fixed
bullseye, sid, buster2:5.6.0-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tidysource(unstable)(not affected)
tidy-html5source(unstable)2:5.6.0-3medium
tidy-html5sourcestretch(not affected)

Notes

[stretch] - tidy-html5 <not-affected> (Vulnerable code introduced after 5.6.0)
- tidy <not-affected> (Vulnerable code not present)
https://github.com/htacg/tidy-html5/issues/656
https://github.com/htacg/tidy-html5/commit/a111d7a9691953f903ffa1fdbc3762dec22fc215
Issue originally never in DEbian because teh vulnerable code was
introduced in 5.6.0. But with the 2:5.6.0-1 upload the package got
vulnerable and needed a targeted fix via 2:5.6.0-3 upload.

Search for package or bug name: Reporting problems