CVE-2017-5130

Published: 07 February 2018

An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as used in Google Chrome prior to 62.0.3202.62 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted XML file.

Priority

Negligible

CVSS 3 base score: 8.8

Status

Package Release Status
chromium-browser
Launchpad, Ubuntu, Debian
Upstream
Released (62.0.3202.62)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (62.0.3202.62-0ubuntu0.17.10.1380)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (62.0.3202.62-0ubuntu0.16.04.1308)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [62.0.3202.62-0ubuntu0.14.04.1204])
libxml2
Launchpad, Ubuntu, Debian
Upstream
Released (2.9.4+dfsg1-5.1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.9.4+dfsg1-6.1ubuntu1)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored

Ubuntu 14.04 ESM (Trusty Tahr) Ignored

Patches:
Upstream: https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed
Upstream: https://git.gnome.org/browse/libxml2/commit/?id=ed48d65b4d6c5cec7be035ad5eebeba873b4b955
oxide-qt
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(Ubuntu touch end-of-life)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was ignored [Ubuntu touch end-of-life])