Debian Security Advisory
DSA-4086-1 libxml2 -- security update
- Date Reported:
- 13 Jan 2018
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 883790.
In Mitre's CVE dictionary: CVE-2017-15412.
- More information:
Nick Wellnhofer discovered that certain function calls inside XPath predicates can lead to use-after-free and double-free errors when executed by libxml2's XPath engine via an XSLT transformation.
For the oldstable distribution (jessie), this problem has been fixed in version 2.9.1+dfsg1-5+deb8u6.
For the stable distribution (stretch), this problem has been fixed in version 2.9.4+dfsg1-2.2+deb9u2.
We recommend that you upgrade your libxml2 packages.
For the detailed security status of libxml2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libxml2