CVE-2021-42260

NameCVE-2021-42260
DescriptionTinyXML through 2.6.2 has an infinite loop in TiXmlParsingData::Stamp in tinyxmlparser.cpp via the TIXML_UTF_LEAD_0 case. It can be triggered by a crafted XML message and leads to a denial of service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2988-1, DLA-3130-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tinyxml (PTS)buster, bullseye2.6.2-4vulnerable
buster (security)2.6.2-4+deb10u1fixed
bookworm, sid2.6.2-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tinyxmlsourcestretch2.6.2-4+deb9u1DLA-2988-1
tinyxmlsourcebuster2.6.2-4+deb10u1DLA-3130-1
tinyxmlsource(unstable)2.6.2-6

Notes

[bullseye] - tinyxml <no-dsa> (Minor issue)
https://sourceforge.net/p/tinyxml/bugs/141/
https://sourceforge.net/p/tinyxml/git/merge-requests/1/

Search for package or bug name: Reporting problems