Bug 1338700 (CVE-2016-4448) - CVE-2016-4448 libxml2: Format string vulnerability
Summary: CVE-2016-4448 libxml2: Format string vulnerability
Alias: CVE-2016-4448
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: Engineering1340367 Engineering1340369 Engineering1340370 Engineering1340371 1349794 1349795
Blocks: Embargoed1332827 Embargoed1340339 Embargoed1395463
TreeView+ depends on / blocked
Reported: 2016-05-23 09:44 UTC by Andrej Nemec
Modified: 2019-09-29 13:49 UTC (History)
19 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2019-06-08 02:52:22 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:1292 0 normal SHIPPED_LIVE Important: libxml2 security update 2016-07-18 17:29:39 UTC
Red Hat Product Errata RHSA-2016:2957 0 normal SHIPPED_LIVE Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release 2016-12-16 03:11:19 UTC

Description Andrej Nemec 2016-05-23 09:44:52 UTC
A vulnerability was found in the libxml2 library. There exist a possible format string vulnerability.


Upstream fixes:


Comment 3 errata-xmlrpc 2016-06-23 10:33:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7

Via RHSA-2016:1292 https://access.redhat.com/errata/RHSA-2016:1292

Comment 4 Huzaifa S. Sidhpurwala 2016-06-24 09:41:05 UTC
Created libxml2 tracking bugs for this issue:

Affects: fedora-all [bug 1349794]

Comment 5 Huzaifa S. Sidhpurwala 2016-06-24 09:41:18 UTC
Created mingw-libxml2 tracking bugs for this issue:

Affects: fedora-all [bug 1349795]

Comment 6 errata-xmlrpc 2016-12-15 22:19:10 UTC
This issue has been addressed in the following products:

Via RHSA-2016:2957 https://rhn.redhat.com/errata/RHSA-2016-2957.html

Note You need to log in before you can comment on or make changes to this bug.