Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <14D15F41-A2F7-4929-A77B-C89A9A168D5E@stig.io>
Date: Mon, 11 May 2026 09:08:07 +0200
From: Stig Palmquist <stig@...g.io>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2026-8177: XML::LibXML versions through 2.0210
 for Perl read out-of-bounds heap memory when parsing XML node names
 containing truncated UTF-8 byte sequences

> On 10 May 2026, at 22:55, Stig Palmquist <stig@...g.io> wrote:
> 
> ========================================================================
> CVE-2026-8177                                        CPAN Security Group
> ========================================================================
> 
>        CVE ID:  CVE-2026-8177
>  Distribution:  XML-LibXML
>      Versions:  through 2.0210
> 
>      MetaCPAN:  https://metacpan.org/dist/XML-LibXML
>      VCS Repo:  https://github.com/cpan-authors/XML-LibXML
> 
> 
> XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap
> memory when parsing XML node names containing truncated UTF-8 byte
> sequences
> 
> Description
> -----------
> XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap
> memory when parsing XML node names containing truncated UTF-8 byte
> sequences.
> 
> A node name ending in the middle of a multi byte UTF-8 sequence causes
> the parser to read past the end of the input string into adjacent heap
> memory.
> 
> Any Perl process that passes attacker controlled strings to
> XML::LibXML's DOM node-name methods can reach this path on the default
> API. The likely consequence is a crash, causing denial of service.
> 
> Problem types
> -------------
> - CWE-125 Out-of-bounds Read
> 
> Solutions
> ---------
> Upgrade to a future XML::LibXML release, or apply the upstream patch.
> 
> 
> References
> ----------
> https://github.com/cpan-authors/XML-LibXML/issues/146
> https://github.com/cpan-authors/XML-LibXML/commit/15652bd905a6c9dda59a81b14d4766adbbae2ea8.patch
> 
> Timeline
> --------
> - 2026-05-08: Upstream fix merged.


Correction: The timeline for 2026-05-08 stated "Upstream fix merged". This was incorrect. 
On that date a patch was submitted upstream via PR #149, but it has not yet been merged.

https://github.com/cpan-authors/XML-LibXML/pull/149


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.