Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Icewall_federation_agent | Hp | 3.0 (including) | 3.0 (including) |
Red Hat Enterprise Linux 6 | RedHat | libxml2-0:2.7.6-21.el6_8.1 | * |
Red Hat Enterprise Linux 7 | RedHat | libxml2-0:2.9.1-6.el7_2.3 | * |
Text-Only JBCS | RedHat | * | |
Libxml2 | Ubuntu | esm-infra-legacy/trusty | * |
Libxml2 | Ubuntu | esm-infra/xenial | * |
Libxml2 | Ubuntu | precise | * |
Libxml2 | Ubuntu | trusty | * |
Libxml2 | Ubuntu | trusty/esm | * |
Libxml2 | Ubuntu | upstream | * |
Libxml2 | Ubuntu | vivid/stable-phone-overlay | * |
Libxml2 | Ubuntu | wily | * |
Libxml2 | Ubuntu | xenial | * |