Debian Security Advisory DSA-4086-1 email@example.com https://www.debian.org/security/ Salvatore Bonaccorso January 13, 2018 https://www.debian.org/security/faq
Package : libxml2 CVE ID : CVE-2017-15412 Debian Bug : 883790
Nick Wellnhofer discovered that certain function calls inside XPath predicates can lead to use-after-free and double-free errors when executed by libxml2's XPath engine via an XSLT transformation.
For the oldstable distribution (jessie), this problem has been fixed in version 2.9.1+dfsg1-5+deb8u6.
For the stable distribution (stretch), this problem has been fixed in version 2.9.4+dfsg1-2.2+deb9u2.
We recommend that you upgrade your libxml2 packages.
For the detailed security status of libxml2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libxml2
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: firstname.lastname@example.org