Package "libxml2"
Name: |
libxml2
|
Description: |
GNOME XML library
|
Latest version: |
2.12.7+dfsg+really2.9.14-0.4ubuntu0.2 |
Release: |
plucky (25.04) |
Level: |
security |
Repository: |
main |
Homepage: |
http://xmlsoft.org |
Links
Download "libxml2"
Other versions of "libxml2" in Plucky
Packages in group
Deleted packages are displayed in grey.
Changelog
libxml2 (2.12.7+dfsg+really2.9.14-0.4ubuntu0.2) plucky-security; urgency=medium
* SECURITY UPDATE: stack-based buffer overflow
- debian/patches/CVE-2025-6021.patch: fix integer overflow by adding
bound checks in xmlBuildQName in tree.c
prevent integer overflow
- debian/patches/CVE-2025-6170.patch: fix buffer overflow by adding
bound checks in xmlShell in debugXML.c
- CVE-2025-6021
- CVE-2025-6170
* SECURITY UPDATE: UAF and type confusion
- debian/patches/CVE-2025-49794_49796.patch: fix UAF by returning node
and freeing it after use; fix type confusion by adding type check in
xmlSchematronFormatReport in schematron.c
- CVE-2025-49794
- CVE-2025-49796
-- Shishir Subedi <email address hidden> Fri, 08 Aug 2025 14:41:54 +0545
|
Source diff to previous version |
CVE-2025-6021 |
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. |
CVE-2025-6170 |
A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, th |
CVE-2025-49794 |
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematro |
CVE-2025-49796 |
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw a |
|
libxml2 (2.12.7+dfsg+really2.9.14-0.4ubuntu0.1) plucky-security; urgency=medium
* SECURITY UPDATE: OOB access in python API
- debian/patches/CVE-2025-32414-pre1.patch: fix SAX driver with
character streams in python/drv_libxml2.py.
- debian/patches/CVE-2025-32414-1.patch: read at most len/4 characters
in python/libxml.c.
- debian/patches/CVE-2025-32414-2.patch: add a test in
python/tests/Makefile.am, python/tests/unicode.py.
- CVE-2025-32414
* SECURITY UPDATE: heap under-read in xmlSchemaIDCFillNodeTables
- debian/patches/CVE-2025-32415.patch: fix heap buffer overflow in
xmlSchemaIDCFillNodeTables in xmlschemas.c.
- CVE-2025-32415
-- Marc Deslauriers <email address hidden> Thu, 24 Apr 2025 14:42:32 -0400
|
CVE-2025-32414 |
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect |
CVE-2025-32415 |
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a |
|
About
-
Send Feedback to @ubuntu_updates