UbuntuUpdates.org

Package "libxml2-dev"

Name: libxml2-dev

Description:

GNOME XML library - development files

Latest version: 2.12.7+dfsg-3ubuntu0.3
Release: oracular (24.10)
Level: security
Repository: main
Head package: libxml2
Homepage: http://xmlsoft.org

Links


Download "libxml2-dev"


Other versions of "libxml2-dev" in Oracular

Repository Area Version
base main 2.12.7+dfsg-3
updates main 2.12.7+dfsg-3ubuntu0.3

Changelog

Version: 2.12.7+dfsg-3ubuntu0.3 2025-04-29 23:07:09 UTC

  libxml2 (2.12.7+dfsg-3ubuntu0.3) oracular-security; urgency=medium

  * SECURITY UPDATE: OOB access in python API
    - debian/patches/CVE-2025-32414-pre1.patch: fix SAX driver with
      character streams in python/drv_libxml2.py.
    - debian/patches/CVE-2025-32414-1.patch: read at most len/4 characters
      in python/libxml.c.
    - debian/patches/CVE-2025-32414-2.patch: add a test in
      python/tests/Makefile.am, python/tests/unicode.py.
    - CVE-2025-32414
  * SECURITY UPDATE: heap under-read in xmlSchemaIDCFillNodeTables
    - debian/patches/CVE-2025-32415.patch: fix heap buffer overflow in
      xmlSchemaIDCFillNodeTables in xmlschemas.c.
    - CVE-2025-32415

 -- Marc Deslauriers <email address hidden> Thu, 24 Apr 2025 14:42:32 -0400

Source diff to previous version
CVE-2025-32414 In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect
CVE-2025-32415 In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a

Version: 2.12.7+dfsg-3ubuntu0.2 2025-02-25 22:07:09 UTC

  libxml2 (2.12.7+dfsg-3ubuntu0.2) oracular-security; urgency=medium

  * SECURITY UPDATE: use-after-free
    - debian/patches/CVE-2024-56171.patch: Fix use-after-free after
      xmlSchemaItemListAdd.
    - CVE-2024-56171
  * SECURITY UPDATE: stack-based buffer overflow
    - debian/patches/CVE-2025-24928-pre1.patch: Check for NULL node->name
      in xmlSnprintfElements.
    - debian/patches/CVE-2025-24928.patch: Fix stack-buffer-overflow in
      xmlSnprintfElements.
    - CVE-2025-24928
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2025-27113.patch: Fix compilation of explicit
      child axis.
    - CVE-2025-27113

 -- Fabian Toepfer <email address hidden> Thu, 20 Feb 2025 13:23:34 +0100

Source diff to previous version
CVE-2024-56171 libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c.
CVE-2025-24928 libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation
CVE-2025-27113 libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.

Version: 2.12.7+dfsg-3ubuntu0.1 2025-01-16 17:07:04 UTC

  libxml2 (2.12.7+dfsg-3ubuntu0.1) oracular-security; urgency=medium

  * SECURITY UPDATE: XXE via custom SAX handlers
    - debian/patches/CVE-2024-40896.patch: fix XXE protection in
      downstream code in parser.c.
    - CVE-2024-40896

 -- Marc Deslauriers <email address hidden> Wed, 15 Jan 2025 11:26:35 -0500

CVE-2024-40896 In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX



About   -   Send Feedback to @ubuntu_updates