CVE-2021-32796

NameCVE-2021-32796
Descriptionxmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This issue has been resolved in version 0.7.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs991612

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-xmldom (PTS)buster0.1.27+ds-1vulnerable
buster (security)0.1.27+ds-1+deb10u2vulnerable
bullseye0.5.0-1+deb11u2vulnerable
trixie, sid, bookworm0.8.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-xmldomsource(unstable)0.7.3-1991612

Notes

[bullseye] - node-xmldom <ignored> (Minor issue, too intrusive to backport)
[buster] - node-xmldom <ignored> (Minor issue, too intrusive to backport)
https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q
https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b

Search for package or bug name: Reporting problems