CVE-2017-7376

Priority
Description
Buffer overflow in libxml2 allows remote attackers to execute arbitrary
code by leveraging an incorrect limit for port values when handling
redirects.
Notes
sarnoldDebian's triage said the fix isn't complete
Package
Upstream:released (2.9.4+dfsg1-3.1)
Ubuntu 12.04 ESM (Precise Pangolin):released (2.7.8.dfsg-5.1ubuntu4.18)
Ubuntu 14.04 ESM (Trusty Tahr):released (2.9.1+dfsg1-3ubuntu4.10)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.9.3+dfsg1-1ubuntu0.3)
Patches:
Distro:https://android.googlesource.com/platform/external/libxml2/+/51e0cb2e5ec18eaf6fb331bc573ff27b743898f4
Upstream:https://git.gnome.org/browse/libxml2/commit/?id=5dca9eea1bd4263bfa4d037ab2443de1cd730f7e
More Information

Updated: 2020-07-28 20:02:24 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)