Scan for free your assets for this vulnerability
It is easy and free to get started with Mageni and it can be installed in Windows, macOS and Linux.
Processing. Please wait...
No credit card necessary
Debian Security Advisory DSA 4086-1 (libxml2 - security update)
Nick Wellnhofer discovered that certain function calls inside XPath predicates can lead to use-after-free and double-free errors when executed by libxml2's XPath engine via an XSLT transformation.
libxml2 on Debian Linux
This check tests the installed software version using the apt package manager.
For the oldstable distribution (jessie), this problem has been fixed in version 2.9.1+dfsg1-5+deb8u6. For the stable distribution (stretch), this problem has been fixed in version 2.9.4+dfsg1-2.2+deb9u2. We recommend that you upgrade your libxml2 packages. For the detailed security status of libxml2 please refer to its security tracker page linked in the references.
Common Vulnerabilities and Exposures (CVE)
Know your vulnerabilities for free. Start using Mageni today.
Mageni can help you to find, assess and manage your vulnerabilities.Get Started for Free