CVE-2017-9048

NameCVE-2017-9048
Descriptionlibxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1008-1, DSA-3952-1
Debian Bugs863021

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml2 (PTS)jessie, jessie (lts)2.9.1+dfsg1-5+deb8u17fixed
stretch (security)2.9.4+dfsg1-2.2+deb9u7fixed
stretch (lts), stretch2.9.4+dfsg1-2.2+deb9u11fixed
buster, buster (lts)2.9.4+dfsg1-7+deb10u9fixed
buster (security)2.9.4+dfsg1-7+deb10u6fixed
bullseye2.9.10+dfsg-6.7+deb11u4fixed
bullseye (security)2.9.10+dfsg-6.7+deb11u5fixed
bookworm2.9.14+dfsg-1.3~deb12u1fixed
sid, trixie2.12.7+dfsg+really2.9.14-0.2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml2sourcewheezy2.8.0+dfsg1-7+wheezy8DLA-1008-1
libxml2sourcejessie2.9.1+dfsg1-5+deb8u5DSA-3952-1
libxml2sourcestretch2.9.4+dfsg1-2.2+deb9u1DSA-3952-1
libxml2source(unstable)2.9.4+dfsg1-3.1863021

Notes

https://bugzilla.gnome.org/show_bug.cgi?id=781701 (not public)
https://www.openwall.com/lists/oss-security/2017/05/15/1
Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/932cc9896ab41475d4aa429c27d9afd175959d74

Search for package or bug name: Reporting problems