libxml2 (2.9.13+dfsg-1ubuntu0.8) jammy-security; urgency=medium * SECURITY UPDATE: stack-based buffer overflow - debian/patches/CVE-2025-6021.patch: fix integer overflow by adding bound checks in xmlBuildQName in tree.c prevent integer overflow - debian/patches/CVE-2025-6170.patch: fix buffer overflow by adding bound checks in xmlShell in debugXML.c - CVE-2025-6021 - CVE-2025-6170 * SECURITY UPDATE: UAF and type confusion - debian/patches/CVE-2025-49794_49796.patch: fix UAF by returning node and freeing it after use; fix type confusion by adding type check in xmlSchematronFormatReport in schematron.c - CVE-2025-49794 - CVE-2025-49796 -- Shishir Subedi <shishir.subedi@canonical.com> Sat, 09 Aug 2025 11:59:21 +0545 libxml2 (2.9.13+dfsg-1ubuntu0.7) jammy-security; urgency=medium * SECURITY UPDATE: OOB access in python API - debian/patches/CVE-2025-32414-pre1.patch: fix SAX driver with character streams in python/drv_libxml2.py. - debian/patches/CVE-2025-32414-1.patch: read at most len/4 characters in python/libxml.c. - debian/patches/CVE-2025-32414-2.patch: add a test in python/tests/Makefile.am, python/tests/unicode.py. - CVE-2025-32414 * SECURITY UPDATE: heap under-read in xmlSchemaIDCFillNodeTables - debian/patches/CVE-2025-32415.patch: fix heap buffer overflow in xmlSchemaIDCFillNodeTables in xmlschemas.c. - CVE-2025-32415 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 24 Apr 2025 14:42:32 -0400 libxml2 (2.9.13+dfsg-1ubuntu0.6) jammy-security; urgency=medium * SECURITY UPDATE: use-after-free - debian/patches/CVE-2024-56171.patch: Fix use-after-free after xmlSchemaItemListAdd. - CVE-2024-56171 * SECURITY UPDATE: stack-based buffer overflow - debian/patches/CVE-2025-24928-pre1.patch: Check for NULL node->name in xmlSnprintfElements. - debian/patches/CVE-2025-24928.patch: Fix stack-buffer-overflow in xmlSnprintfElements. - CVE-2025-24928 * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2025-27113.patch: Fix compilation of explicit child axis. - CVE-2025-27113 -- Fabian Toepfer <fabian.toepfer@canonical.com> Fri, 21 Feb 2025 15:30:55 +0100 libxml2 (2.9.13+dfsg-1ubuntu0.5) jammy-security; urgency=medium * SECURITY UPDATE: use-after-free in xmlXIncludeAddNode - debian/patches/CVE-2022-49043.patch: fix UaF in xinclude.c. - CVE-2022-49043 * SECURITY UPDATE: buffer overread in xmllint - debian/patches/CVE-2024-34459.patch: fix buffer issue when using htmlout option in xmllint.c. - CVE-2024-34459 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 28 Jan 2025 08:30:32 -0500 libxml2 (2.9.13+dfsg-1ubuntu0.4) jammy-security; urgency=medium * SECURITY UPDATE: use-after-free via XInclude expansion - debian/patches/CVE-2024-25062.patch: don't expand XIncludes when backtracking in xmlreader.c. - CVE-2024-25062 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Fri, 16 Feb 2024 13:14:24 -0500 libxml2 (2.9.13+dfsg-1ubuntu0.3) jammy-security; urgency=medium * SECURITY UPDATE: Null dereference - debian/patches/CVE-2023-28484-*.patch: Fix null-pointer-deref in xmlSchemaCheckCOSSTDerivedOK and xmlSchemaFixupComplexType when parsing (invalid) XML schemas in result/schemas/oss-fuzz-51295_0_0.err, test/schemas/oss-fuzz-51295_0.xml, test/schemas/oss-fuzz-51295_0.xsd, xmlschemas.c. - CVE-2023-28484 * SECURITY UPDATE: Logic or memory errors and double frees - debian/patches/CVE-2023-29469.patch: check namelen less equal zero in dict.c. - CVE-2023-29469 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Fri, 14 Apr 2023 08:19:12 -0300 libxml2 (2.9.13+dfsg-1ubuntu0.2) jammy-security; urgency=medium * SECURITY UPDATE: NULL pointer dereference - debian/patches/CVE-2022-2309.patch: reset nsNr in xmlCtxReset in parser.c (LP: #1996494). - CVE-2022-2309 * SECURITY UPDATE: Integer overflow - debian/patches/CVE-2022-40303.patch: fix integer overflows with XML_PARSE_HUGE in parser.c. - CVE-2022-40303 * SECURITY UPDATE: Double-free - debian/patches/CVE-2022-40304.patch: fix dict corruption caused by entity ref cycles in entities.c. - CVE-2022-40304 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Tue, 29 Nov 2022 16:39:07 -0300 libxml2 (2.9.13+dfsg-1ubuntu0.1) jammy-security; urgency=medium * SECURITY UPDATE: Integer overflows - debian/patches/CVE-2022-29824.patch: Fix integer overflows in xmlBuf and xmlBuffer in tree.c, buf.c. - CVE-2022-29824 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Mon, 09 May 2022 15:33:11 -0300 libxml2 (2.9.13+dfsg-1build1) jammy; urgency=medium * No-change rebuild with Python 3.10 only -- Graham Inggs <ginggs@ubuntu.com> Thu, 17 Mar 2022 19:28:02 +0000 libxml2 (2.9.13+dfsg-1) unstable; urgency=medium * Team upload. * New upstream version 2.9.13+dfsg. + Convert devhelp to version2. Closes: #955205 + Use-after-free of ID and IDREF attrs. CVE-2022-23308; Closes: #1006489 * Bump my copyright for debian/*. * d/watch: move download sourceto https://download.gnome.org/. -- Mattia Rizzolo <mattia@debian.org> Sun, 27 Feb 2022 19:57:48 +0100 # For older changelog entries, run 'apt-get changelog libxml2-doc'
Generated by dwww version 1.14 on Mon Aug 25 11:33:30 CEST 2025.