Bug#866676: libxml-libxml-perl: CVE-2017-10672: Use-after-free in XML::LibXML::Node::replaceChild
Salvatore Bonaccorso
carnil at debian.org
Fri Jun 30 19:04:36 UTC 2017
Source: libxml-libxml-perl
Version: 2.0116+dfsg-1
Severity: grave
Tags: security upstream
Forwarded: https://rt.cpan.org/Ticket/Display.html?id=122246
Hi,
the following vulnerability was published for libxml-libxml-perl.
Filling this one for now as severity grave, but we might adjust later
the severity if not appropriate.
CVE-2017-10672[0]:
| Use-after-free in the XML-LibXML module through 2.0129 for Perl allows
| remote attackers to execute arbitrary code by controlling the arguments
| to a replaceChild call.
There is no upstream fix yet.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-10672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10672
[1] https://rt.cpan.org/Ticket/Display.html?id=122246
Regards,
Salvatore
More information about the pkg-perl-maintainers
mailing list