Package "libxml2"
Name: |
libxml2
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- GNOME XML library - Python3 bindings
|
Latest version: |
2.12.7+dfsg-3ubuntu0.3 |
Release: |
oracular (24.10) |
Level: |
updates |
Repository: |
universe |
Links
Other versions of "libxml2" in Oracular
Packages in group
Deleted packages are displayed in grey.
Changelog
libxml2 (2.12.7+dfsg-3ubuntu0.3) oracular-security; urgency=medium
* SECURITY UPDATE: OOB access in python API
- debian/patches/CVE-2025-32414-pre1.patch: fix SAX driver with
character streams in python/drv_libxml2.py.
- debian/patches/CVE-2025-32414-1.patch: read at most len/4 characters
in python/libxml.c.
- debian/patches/CVE-2025-32414-2.patch: add a test in
python/tests/Makefile.am, python/tests/unicode.py.
- CVE-2025-32414
* SECURITY UPDATE: heap under-read in xmlSchemaIDCFillNodeTables
- debian/patches/CVE-2025-32415.patch: fix heap buffer overflow in
xmlSchemaIDCFillNodeTables in xmlschemas.c.
- CVE-2025-32415
-- Marc Deslauriers <email address hidden> Thu, 24 Apr 2025 14:42:32 -0400
|
Source diff to previous version |
CVE-2025-32414 |
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect |
CVE-2025-32415 |
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a |
|
libxml2 (2.12.7+dfsg-3ubuntu0.2) oracular-security; urgency=medium
* SECURITY UPDATE: use-after-free
- debian/patches/CVE-2024-56171.patch: Fix use-after-free after
xmlSchemaItemListAdd.
- CVE-2024-56171
* SECURITY UPDATE: stack-based buffer overflow
- debian/patches/CVE-2025-24928-pre1.patch: Check for NULL node->name
in xmlSnprintfElements.
- debian/patches/CVE-2025-24928.patch: Fix stack-buffer-overflow in
xmlSnprintfElements.
- CVE-2025-24928
* SECURITY UPDATE: NULL pointer dereference
- debian/patches/CVE-2025-27113.patch: Fix compilation of explicit
child axis.
- CVE-2025-27113
-- Fabian Toepfer <email address hidden> Thu, 20 Feb 2025 13:23:34 +0100
|
Source diff to previous version |
CVE-2024-56171 |
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. |
CVE-2025-24928 |
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation |
CVE-2025-27113 |
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c. |
|
libxml2 (2.12.7+dfsg-3ubuntu0.1) oracular-security; urgency=medium
* SECURITY UPDATE: XXE via custom SAX handlers
- debian/patches/CVE-2024-40896.patch: fix XXE protection in
downstream code in parser.c.
- CVE-2024-40896
-- Marc Deslauriers <email address hidden> Wed, 15 Jan 2025 11:26:35 -0500
|
CVE-2024-40896 |
In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX |
|
About
-
Send Feedback to @ubuntu_updates