Package "libxml2"
  
    
    
        | Name: | 
        libxml2
            
         | 
    
    
         Description: | 
        
             GNOME XML library 
         | 
    
    
        | Latest version: | 
        2.9.14+dfsg-1.3ubuntu3.6 | 
    
    
        | Release: | 
        noble (24.04) | 
    
    
        | Level: | 
        security | 
    
    
        | Repository: | 
        main | 
    
        
            | Homepage: | 
            http://xmlsoft.org | 
        
    
   
  
  
 
Links
    Download "libxml2"
    
Other versions of "libxml2" in Noble
    
Packages in group
Deleted packages are displayed in grey.
Changelog
    
    
    
        
        
    
    
        | 
               libxml2 (2.9.14+dfsg-1.3ubuntu3.6) noble-security; urgency=medium 
  * SECURITY UPDATE: libxslt internal memory corruption
     - debian/patches/CVE-2025-7425.patch: fix heap-use-after-free in
       xmlFreeID caused by atype corruption.
     - CVE-2025-7425 
 -- Marc Deslauriers <email address hidden>  Thu, 30 Oct 2025 09:26:06 -0400 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2025-7425 | 
                A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT function | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               libxml2 (2.9.14+dfsg-1.3ubuntu3.5) noble-security; urgency=medium 
  * SECURITY UPDATE: Stack overflow
     - debian/patches/CVE-2025-9714.patch: Make XPath depth check work with
       recursive invocations.
     - CVE-2025-9714 
 -- Octavio Galland <email address hidden>  Fri, 05 Sep 2025 12:36:12 -0300 
         | 
    
    | Source diff to previous version | 
    
    
    
    
    
        
        
    
    
        | 
               libxml2 (2.9.14+dfsg-1.3ubuntu3.4) noble-security; urgency=medium 
  * SECURITY UPDATE: stack-based buffer overflow
     - debian/patches/CVE-2025-6021.patch: fix integer overflow by adding
       bound checks in xmlBuildQName in tree.c
       prevent integer overflow
     - debian/patches/CVE-2025-6170.patch: fix buffer overflow by adding
       bound checks in xmlShell in debugXML.c
     - CVE-2025-6021
     - CVE-2025-6170
   * SECURITY UPDATE: UAF and type confusion
     - debian/patches/CVE-2025-49794_49796.patch: fix UAF by returning node
       and freeing it after use; fix type confusion by adding type check in
       xmlSchematronFormatReport in schematron.c
     - CVE-2025-49794
     - CVE-2025-49796 
 -- Shishir Subedi <email address hidden>  Sat, 09 Aug 2025 11:59:12 +0545 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2025-6021 | 
                A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow.  | 
                 
                
                | CVE-2025-6170 | 
                A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, th | 
                 
                
                | CVE-2025-49794 | 
                A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematro | 
                 
                
                | CVE-2025-49796 | 
                A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw a | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               libxml2 (2.9.14+dfsg-1.3ubuntu3.3) noble-security; urgency=medium 
  * SECURITY UPDATE: OOB access in python API
     - debian/patches/CVE-2025-32414-pre1.patch: fix SAX driver with
       character streams in python/drv_libxml2.py.
     - debian/patches/CVE-2025-32414-1.patch: read at most len/4 characters
       in python/libxml.c.
     - debian/patches/CVE-2025-32414-2.patch: add a test in
       python/tests/Makefile.am, python/tests/unicode.py.
     - CVE-2025-32414
   * SECURITY UPDATE: heap under-read in xmlSchemaIDCFillNodeTables
     - debian/patches/CVE-2025-32415.patch: fix heap buffer overflow in
       xmlSchemaIDCFillNodeTables in xmlschemas.c.
     - CVE-2025-32415 
 -- Marc Deslauriers <email address hidden>  Thu, 24 Apr 2025 14:42:32 -0400 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2025-32414 | 
                In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect  | 
                 
                
                | CVE-2025-32415 | 
                In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a  | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               libxml2 (2.9.14+dfsg-1.3ubuntu3.2) noble-security; urgency=medium 
  * SECURITY UPDATE: use-after-free
     - debian/patches/CVE-2024-56171.patch: Fix use-after-free after
       xmlSchemaItemListAdd.
     - CVE-2024-56171
   * SECURITY UPDATE: stack-based buffer overflow
     - debian/patches/CVE-2025-24928-pre1.patch: Check for NULL node->name
       in xmlSnprintfElements.
     - debian/patches/CVE-2025-24928.patch: Fix stack-buffer-overflow in
       xmlSnprintfElements.
     - CVE-2025-24928
   * SECURITY UPDATE: NULL pointer dereference
     - debian/patches/CVE-2025-27113.patch: Fix compilation of explicit
       child axis.
     - CVE-2025-27113 
 -- Fabian Toepfer <email address hidden>  Thu, 20 Feb 2025 13:28:43 +0100 
         | 
    
    
        
        
            
            
                
                | CVE-2024-56171 | 
                libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c.  | 
                 
                
                | CVE-2025-24928 | 
                libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation  | 
                 
                
                | CVE-2025-27113 | 
                libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c. | 
                 
             
         | 
        
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates