Package "libxml2-dev"
  
    
    
        | Name: | libxml2-dev | 
    
        | Description:
 | Development files for the GNOME XML library | 
    
        | Latest version: | 2.9.10+dfsg-5ubuntu0.20.04.10 | 
    
        | Release: | focal (20.04) | 
    
        | Level: | updates | 
    
        | Repository: | main | 
         
            | Head package: | libxml2 | 
        
            | Homepage: | http://xmlsoft.org | 
    
   
  
  
 
Links
    Download "libxml2-dev"
    
Other versions of "libxml2-dev" in Focal
    
Changelog
    
    
    
        
        
    
    
        |   libxml2 (2.9.10+dfsg-5ubuntu0.20.04.10) focal-security; urgency=medium   * SECURITY UPDATE: OOB access in python API
- debian/patches/CVE-2025-32414-pre1.patch: fix SAX driver with
 character streams in python/drv_libxml2.py.
 - debian/patches/CVE-2025-32414-1.patch: read at most len/4 characters
 in python/libxml.c.
 - debian/patches/CVE-2025-32414-2.patch: add a test in
 python/tests/Makefile.am, python/tests/unicode.py.
 - CVE-2025-32414
 * SECURITY UPDATE: heap under-read in xmlSchemaIDCFillNodeTables
 - debian/patches/CVE-2025-32415.patch: fix heap buffer overflow in
 xmlSchemaIDCFillNodeTables in xmlschemas.c.
 - CVE-2025-32415
  -- Marc Deslauriers <email address hidden>  Thu, 24 Apr 2025 14:47:09 -0400 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2025-32414 | In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect |  
                | CVE-2025-32415 | In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a |  | 
    
    
    
    
    
        
        
    
    
        |   libxml2 (2.9.10+dfsg-5ubuntu0.20.04.9) focal-security; urgency=medium   * SECURITY UPDATE: use-after-free
- debian/patches/CVE-2024-56171.patch: Fix use-after-free after
 xmlSchemaItemListAdd.
 - CVE-2024-56171
 * SECURITY UPDATE: stack-based buffer overflow
 - debian/patches/CVE-2025-24928-pre1.patch: Check for NULL node->name
 in xmlSnprintfElements.
 - debian/patches/CVE-2025-24928.patch: Fix stack-buffer-overflow in
 xmlSnprintfElements.
 - CVE-2025-24928
 * SECURITY UPDATE: NULL pointer dereference
 - debian/patches/CVE-2025-27113.patch: Fix compilation of explicit
 child axis.
 - CVE-2025-27113
  -- Fabian Toepfer <email address hidden>  Fri, 21 Feb 2025 15:32:54 +0100 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2024-56171 | libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. |  
                | CVE-2025-24928 | libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation |  
                | CVE-2025-27113 | libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c. |  | 
    
    
    
    
    
        
        
    
    
        |   libxml2 (2.9.10+dfsg-5ubuntu0.20.04.8) focal-security; urgency=medium   * SECURITY UPDATE: use-after-free in xmlXIncludeAddNode
- debian/patches/CVE-2022-49043.patch: fix UaF in xinclude.c.
 - CVE-2022-49043
 * SECURITY UPDATE: buffer overread in xmllint
 - debian/patches/CVE-2024-34459.patch: fix buffer issue when using
 htmlout option in xmllint.c.
 - CVE-2024-34459
  -- Marc Deslauriers <email address hidden>  Tue, 28 Jan 2025 08:31:05 -0500 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2022-49043 | xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free. |  
                | CVE-2024-34459 | An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result |  | 
    
    
    
    
    
        
        
    
    
        |   libxml2 (2.9.10+dfsg-5ubuntu0.20.04.7) focal-security; urgency=medium   * SECURITY UPDATE: use-after-free via XInclude expansion
- debian/patches/CVE-2024-25062-pre1.patch: avoid call stack overflow
 with XML reader and recursive XIncludes in xmlreader.c.
 - debian/patches/CVE-2024-25062.patch: don't expand XIncludes when
 backtracking in xmlreader.c.
 - CVE-2024-25062
  -- Marc Deslauriers <email address hidden>  Fri, 16 Feb 2024 13:19:13 -0500 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2024-25062 | An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expan |  | 
    
    
    
    
    
        
        
    
    
        |   libxml2 (2.9.10+dfsg-5ubuntu0.20.04.6) focal-security; urgency=medium   * SECURITY UPDATE: Null dereference
- debian/patches/CVE-2023-28484-*.patch: Fix null-pointer-deref in
 xmlSchemaCheckCOSSTDerivedOK and xmlSchemaFixupComplexType
 when parsing (invalid) XML schemas in
 result/schemas/oss-fuzz-51295_0_0.err,
 test/schemas/oss-fuzz-51295_0.xml,
 test/schemas/oss-fuzz-51295_0.xsd,
 xmlschemas.c.
 - CVE-2023-28484
 * SECURITY UPDATE: Logic or memory errors and double frees
 - debian/patches/CVE-2023-29469.patch: check namelen less equal zero in
 dict.c.
 - CVE-2023-29469
  -- Leonidas Da Silva Barbosa <email address hidden>  Fri, 14 Apr 2023 09:29:46 -0300 | 
    
        
        |  | 
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates