UbuntuUpdates.org

Package "libxml2"

Name: libxml2

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • GNOME XML library - Python3 bindings

Latest version: 2.9.13+dfsg-1ubuntu0.2
Release: jammy (22.04)
Level: updates
Repository: universe

Links



Other versions of "libxml2" in Jammy

Repository Area Version
base universe 2.9.13+dfsg-1build1
base main 2.9.13+dfsg-1build1
security main 2.9.13+dfsg-1ubuntu0.2
security universe 2.9.13+dfsg-1ubuntu0.2
updates main 2.9.13+dfsg-1ubuntu0.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.9.13+dfsg-1ubuntu0.2 2022-12-05 14:07:25 UTC

  libxml2 (2.9.13+dfsg-1ubuntu0.2) jammy-security; urgency=medium

  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2022-2309.patch: reset nsNr in
      xmlCtxReset in parser.c (LP: #1996494).
    - CVE-2022-2309
  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2022-40303.patch: fix integer overflows
      with XML_PARSE_HUGE in parser.c.
    - CVE-2022-40303
  * SECURITY UPDATE: Double-free
    - debian/patches/CVE-2022-40304.patch: fix dict
      corruption caused by entity ref cycles in
      entities.c.
    - CVE-2022-40304

 -- Leonidas Da Silva Barbosa <email address hidden> Tue, 29 Nov 2022 16:39:07 -0300

Source diff to previous version
1996494 CVE-2022-2309: NULL Pointer Dereference allows attackers to cause a denial of service (or application crash)
CVE-2022-2309 NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libx
CVE-2022-40303 An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several i
CVE-2022-40304 An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequ

Version: 2.9.13+dfsg-1ubuntu0.1 2022-05-16 19:06:30 UTC

  libxml2 (2.9.13+dfsg-1ubuntu0.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Integer overflows
    - debian/patches/CVE-2022-29824.patch: Fix integer overflows in
      xmlBuf and xmlBuffer in tree.c, buf.c.
    - CVE-2022-29824

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 09 May 2022 15:33:11 -0300

CVE-2022-29824 In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can re



About   -   Send Feedback to @ubuntu_updates