UbuntuUpdates.org

Package "libxml2"

Name: libxml2

Description:

GNOME XML library

Latest version: 2.9.13+dfsg-1ubuntu0.7
Release: jammy (22.04)
Level: security
Repository: main
Homepage: http://xmlsoft.org

Links


Download "libxml2"


Other versions of "libxml2" in Jammy

Repository Area Version
base universe 2.9.13+dfsg-1build1
base main 2.9.13+dfsg-1build1
security universe 2.9.13+dfsg-1ubuntu0.7
updates main 2.9.13+dfsg-1ubuntu0.7
updates universe 2.9.13+dfsg-1ubuntu0.7

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.9.13+dfsg-1ubuntu0.7 2025-04-28 15:07:01 UTC

  libxml2 (2.9.13+dfsg-1ubuntu0.7) jammy-security; urgency=medium

  * SECURITY UPDATE: OOB access in python API
    - debian/patches/CVE-2025-32414-pre1.patch: fix SAX driver with
      character streams in python/drv_libxml2.py.
    - debian/patches/CVE-2025-32414-1.patch: read at most len/4 characters
      in python/libxml.c.
    - debian/patches/CVE-2025-32414-2.patch: add a test in
      python/tests/Makefile.am, python/tests/unicode.py.
    - CVE-2025-32414
  * SECURITY UPDATE: heap under-read in xmlSchemaIDCFillNodeTables
    - debian/patches/CVE-2025-32415.patch: fix heap buffer overflow in
      xmlSchemaIDCFillNodeTables in xmlschemas.c.
    - CVE-2025-32415

 -- Marc Deslauriers <email address hidden> Thu, 24 Apr 2025 14:42:32 -0400

Source diff to previous version
CVE-2025-32414 In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect
CVE-2025-32415 In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a

Version: 2.9.13+dfsg-1ubuntu0.6 2025-02-25 22:07:03 UTC

  libxml2 (2.9.13+dfsg-1ubuntu0.6) jammy-security; urgency=medium

  * SECURITY UPDATE: use-after-free
    - debian/patches/CVE-2024-56171.patch: Fix use-after-free after
      xmlSchemaItemListAdd.
    - CVE-2024-56171
  * SECURITY UPDATE: stack-based buffer overflow
    - debian/patches/CVE-2025-24928-pre1.patch: Check for NULL node->name
      in xmlSnprintfElements.
    - debian/patches/CVE-2025-24928.patch: Fix stack-buffer-overflow in
      xmlSnprintfElements.
    - CVE-2025-24928
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2025-27113.patch: Fix compilation of explicit
      child axis.
    - CVE-2025-27113

 -- Fabian Toepfer <email address hidden> Fri, 21 Feb 2025 15:30:55 +0100

Source diff to previous version
CVE-2024-56171 libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c.
CVE-2025-24928 libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation
CVE-2025-27113 libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.

Version: 2.9.13+dfsg-1ubuntu0.5 2025-01-29 20:06:59 UTC

  libxml2 (2.9.13+dfsg-1ubuntu0.5) jammy-security; urgency=medium

  * SECURITY UPDATE: use-after-free in xmlXIncludeAddNode
    - debian/patches/CVE-2022-49043.patch: fix UaF in xinclude.c.
    - CVE-2022-49043
  * SECURITY UPDATE: buffer overread in xmllint
    - debian/patches/CVE-2024-34459.patch: fix buffer issue when using
      htmlout option in xmllint.c.
    - CVE-2024-34459

 -- Marc Deslauriers <email address hidden> Tue, 28 Jan 2025 08:30:32 -0500

Source diff to previous version
CVE-2022-49043 xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free.
CVE-2024-34459 An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result

Version: 2.9.13+dfsg-1ubuntu0.4 2024-02-26 16:06:58 UTC

  libxml2 (2.9.13+dfsg-1ubuntu0.4) jammy-security; urgency=medium

  * SECURITY UPDATE: use-after-free via XInclude expansion
    - debian/patches/CVE-2024-25062.patch: don't expand XIncludes when
      backtracking in xmlreader.c.
    - CVE-2024-25062

 -- Marc Deslauriers <email address hidden> Fri, 16 Feb 2024 13:14:24 -0500

Source diff to previous version
CVE-2024-25062 An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expan

Version: 2.9.13+dfsg-1ubuntu0.3 2023-04-19 17:22:58 UTC

  libxml2 (2.9.13+dfsg-1ubuntu0.3) jammy-security; urgency=medium

  * SECURITY UPDATE: Null dereference
    - debian/patches/CVE-2023-28484-*.patch: Fix null-pointer-deref in
      xmlSchemaCheckCOSSTDerivedOK and xmlSchemaFixupComplexType
      when parsing (invalid) XML schemas in
      result/schemas/oss-fuzz-51295_0_0.err,
      test/schemas/oss-fuzz-51295_0.xml,
      test/schemas/oss-fuzz-51295_0.xsd,
      xmlschemas.c.
    - CVE-2023-28484
  * SECURITY UPDATE: Logic or memory errors and double frees
    - debian/patches/CVE-2023-29469.patch: check namelen less equal zero in
      dict.c.
    - CVE-2023-29469

 -- Leonidas Da Silva Barbosa <email address hidden> Fri, 14 Apr 2023 08:19:12 -0300

CVE-2023-28484 NULL dereference in xmlSchemaFixupComplexType
CVE-2023-29469 Hashing of empty dict strings isn't deterministic



About   -   Send Feedback to @ubuntu_updates