Package "libxml2-doc"
Name: |
libxml2-doc
|
Description: |
GNOME XML library - documentation
|
Latest version: |
2.9.13+dfsg-1ubuntu0.6 |
Release: |
jammy (22.04) |
Level: |
updates |
Repository: |
main |
Head package: |
libxml2 |
Homepage: |
http://xmlsoft.org |
Links
Download "libxml2-doc"
Other versions of "libxml2-doc" in Jammy
Changelog
libxml2 (2.9.13+dfsg-1ubuntu0.6) jammy-security; urgency=medium
* SECURITY UPDATE: use-after-free
- debian/patches/CVE-2024-56171.patch: Fix use-after-free after
xmlSchemaItemListAdd.
- CVE-2024-56171
* SECURITY UPDATE: stack-based buffer overflow
- debian/patches/CVE-2025-24928-pre1.patch: Check for NULL node->name
in xmlSnprintfElements.
- debian/patches/CVE-2025-24928.patch: Fix stack-buffer-overflow in
xmlSnprintfElements.
- CVE-2025-24928
* SECURITY UPDATE: NULL pointer dereference
- debian/patches/CVE-2025-27113.patch: Fix compilation of explicit
child axis.
- CVE-2025-27113
-- Fabian Toepfer <email address hidden> Fri, 21 Feb 2025 15:30:55 +0100
|
Source diff to previous version |
CVE-2024-56171 |
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. |
CVE-2025-24928 |
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation |
CVE-2025-27113 |
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c. |
|
libxml2 (2.9.13+dfsg-1ubuntu0.5) jammy-security; urgency=medium
* SECURITY UPDATE: use-after-free in xmlXIncludeAddNode
- debian/patches/CVE-2022-49043.patch: fix UaF in xinclude.c.
- CVE-2022-49043
* SECURITY UPDATE: buffer overread in xmllint
- debian/patches/CVE-2024-34459.patch: fix buffer issue when using
htmlout option in xmllint.c.
- CVE-2024-34459
-- Marc Deslauriers <email address hidden> Tue, 28 Jan 2025 08:30:32 -0500
|
Source diff to previous version |
CVE-2022-49043 |
xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free. |
CVE-2024-34459 |
An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result |
|
libxml2 (2.9.13+dfsg-1ubuntu0.4) jammy-security; urgency=medium
* SECURITY UPDATE: use-after-free via XInclude expansion
- debian/patches/CVE-2024-25062.patch: don't expand XIncludes when
backtracking in xmlreader.c.
- CVE-2024-25062
-- Marc Deslauriers <email address hidden> Fri, 16 Feb 2024 13:14:24 -0500
|
Source diff to previous version |
CVE-2024-25062 |
An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expan |
|
libxml2 (2.9.13+dfsg-1ubuntu0.3) jammy-security; urgency=medium
* SECURITY UPDATE: Null dereference
- debian/patches/CVE-2023-28484-*.patch: Fix null-pointer-deref in
xmlSchemaCheckCOSSTDerivedOK and xmlSchemaFixupComplexType
when parsing (invalid) XML schemas in
result/schemas/oss-fuzz-51295_0_0.err,
test/schemas/oss-fuzz-51295_0.xml,
test/schemas/oss-fuzz-51295_0.xsd,
xmlschemas.c.
- CVE-2023-28484
* SECURITY UPDATE: Logic or memory errors and double frees
- debian/patches/CVE-2023-29469.patch: check namelen less equal zero in
dict.c.
- CVE-2023-29469
-- Leonidas Da Silva Barbosa <email address hidden> Fri, 14 Apr 2023 08:19:12 -0300
|
Source diff to previous version |
|
libxml2 (2.9.13+dfsg-1ubuntu0.2) jammy-security; urgency=medium
* SECURITY UPDATE: NULL pointer dereference
- debian/patches/CVE-2022-2309.patch: reset nsNr in
xmlCtxReset in parser.c (LP: #1996494).
- CVE-2022-2309
* SECURITY UPDATE: Integer overflow
- debian/patches/CVE-2022-40303.patch: fix integer overflows
with XML_PARSE_HUGE in parser.c.
- CVE-2022-40303
* SECURITY UPDATE: Double-free
- debian/patches/CVE-2022-40304.patch: fix dict
corruption caused by entity ref cycles in
entities.c.
- CVE-2022-40304
-- Leonidas Da Silva Barbosa <email address hidden> Tue, 29 Nov 2022 16:39:07 -0300
|
1996494 |
CVE-2022-2309: NULL Pointer Dereference allows attackers to cause a denial of service (or application crash) |
CVE-2022-2309 |
NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libx |
CVE-2022-40303 |
An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several i |
CVE-2022-40304 |
An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequ |
|
About
-
Send Feedback to @ubuntu_updates