Bug 58438 - libxml2: Multiple issues (5.2)
Summary: libxml2: Multiple issues (5.2)
Status: CLOSED FIXED
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 5.2
Hardware: All Linux
: P3 normal
Target Milestone: UCS 5.2-2-errata
Assignee: Quality Assurance
QA Contact: Christian Castens
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2025-06-30 23:42 CEST by Quality Assurance
Modified: 2025-07-02 14:51 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Customer ID:
Max CVSS v3 score: 8.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H) NVD


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2025-06-30 23:42:59 CEST
New Debian libxml2 2.9.14+dfsg-1.3~deb12u2 fixes:
This update addresses the following issues:
2.9.14+dfsg-1.3~deb12u2 (Fri, 06 Jun 2025 16:50:13 +0800)
* Security fixes: - CVE-2023-39615: out-of-bounds read via the  xmlSAX2StartElement() - CVE-2023-45322: use-after-free in xmlUnlinkNode() -  CVE-2024-25062: use-after-free in xmlValidatePopElement() - CVE-2025-32414:  out-of-bounds read in Python bindings - CVE-2025-32415: heap-based buffer  under-read via
xmlSchemaIDCFillNodeTables() - CVE-2022-49043: use-after-free in
xmlXIncludeAddNode() - CVE-2024-34459: buffer over-read in
xmlHTMLPrintFileContext of xmllint - CVE-2024-56171: use-after-free after
xmlSchemaItemListAdd() - CVE-2025-24928: stack-buffer-overflow in
xmlSnprintfElements() - CVE-2025-27113: NULL pointer dereference in
xmlPatMatch()
Comment 1 Quality Assurance univentionstaff 2025-07-01 00:00:08 CEST
--- mirror/ftp/pool/main/libx/libxml2/libxml2_2.9.14+dfsg-1.3~deb12u1.dsc
+++ apt/ucs_5.2-0-errata5.2-2/source/libxml2_2.9.14+dfsg-1.3~deb12u2.dsc
@@ -1,3 +1,27 @@
+2.9.14+dfsg-1.3~deb12u2 [Fri, 06 Jun 2025 16:50:13 +0800] Aron Xu <aron@debian.org>:
+
+  * Security fixes:
+    - CVE-2023-39615: out-of-bounds read via the xmlSAX2StartElement()
+      (Closes: #1051230)
+    - CVE-2023-45322: use-after-free in xmlUnlinkNode()
+      (Closes: #1053629)
+    - CVE-2024-25062: use-after-free in xmlValidatePopElement()
+      (Closes: #1063234)
+    - CVE-2025-32414: out-of-bounds read in Python bindings
+      (Closes: #1102521)
+    - CVE-2025-32415: heap-based buffer under-read via
+      xmlSchemaIDCFillNodeTables() (Closes: #1103511)
+    - CVE-2022-49043: use-after-free in xmlXIncludeAddNode()
+      (Closes: #1094238)
+    - CVE-2024-34459: buffer over-read in xmlHTMLPrintFileContext of xmllint
+      (Closes: #1071162)
+    - CVE-2024-56171: use-after-free after xmlSchemaItemListAdd()
+      (Closes: #1098320)
+    - CVE-2025-24928: stack-buffer-overflow in xmlSnprintfElements()
+      (Closes: #1098321)
+    - CVE-2025-27113: NULL pointer dereference in xmlPatMatch()
+      (Closes: #1098322)
+
 2.9.14+dfsg-1.3~deb12u1 [Mon, 10 Jul 2023 21:58:07 +0200] Salvatore Bonaccorso <carnil@debian.org>:
 
   * Rebuild for bookworm

<http://piuparts.knut.univention.de/5.2-2/#6299976808210733420>
Comment 2 Christian Castens univentionstaff 2025-07-02 09:28:12 CEST
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.2-2] 15b292e28c Bug #58438: libxml2 2.9.14+dfsg-1.3~deb12u2
 doc/errata/staging/libxml2.yaml | 34 ++++++++++++++++++++++++++++++++++
 1 file changed, 34 insertions(+)
Comment 3 Christian Castens univentionstaff 2025-07-02 14:51:49 CEST
<https://errata.software-univention.de/#/?erratum=5.2x133>