![]() There is no fixed version for Debian:8 libxml2. See How to fix? for Debian:8 relevant fixed versions and status.įormat string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors. Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Debian:8. There is no fixed version for Debian:8 glibc. Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function. See How to fix? for Debian:8 relevant fixed versions and status. Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Debian:8.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |