Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 19 Mar 2018 15:05:04 -0700 (PDT)
From:      Don Lewis <truckman@FreeBSD.org>
To:        Roger Marquis <marquis@roble.com>
Cc:        gnome@FreeBSD.org
Subject:   Re: CVE-2017-7376 -- libxml2 
Message-ID:  <tkrat.1f882c554f26c50b@FreeBSD.org>
In-Reply-To: <nycvar.OFS.7.76.1803190804160.5758@mx.roble.com>
References:  <nycvar.OFS.7.76.1803190804160.5758@mx.roble.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 19 Mar, Roger Marquis wrote:
> Assuming FreeBSD's port is also vulnerable even though the OS is not
> listed in the CVE.  Can anyone confirm?
> 
> <https://nvd.nist.gov/vuln/detail/CVE-2017-7376>:
> 
>   Buffer overflow in libxml2 allows remote attackers to execute arbitrary
>   code by leveraging an incorrect limit for port values when handling
>   redirects.

It looks like this has been fixed in version libxml2 version 2.9.7,
which is the current version of the FreeBSD port.

This link on the page referenced above:
  https://git.gnome.org/browse/libxml2/commit/?id=5dca9eea1bd4263bfa4d037ab2443de1cd730f7e
appears to be the bug fix and it is present in the 2.9.7 source.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?tkrat.1f882c554f26c50b>