ELA-1227-1 libxml2 security update

multiple vulnerabilities

2024-11-03
Packagelibxml2
Version2.9.1+dfsg1-5+deb8u17 (jessie), 2.9.4+dfsg1-7+deb10u9 (buster)
Related CVEs CVE-2016-9318 CVE-2017-16932 CVE-2023-39615 CVE-2023-45322 CVE-2024-25062


Several vulnerabilities were discovered in libxml2, a library providing support to read, modify and write XML and HTML files, potentially allowing an attacker to perform denial of service or trigger an use-after-free situation.

CVE-2016-9318 (Debian 8 update only)

XML External Entity (XXE) attacks via a crafted document.

Note: CVE-2016-9318 has been previously addressed for Debian 10 (buster) in ELA-1195.

CVE-2017-16932

When expanding a parameter entity in a DTD, infinite recursion could lead to
an infinite loop or memory exhaustion.

CVE-2023-39615

Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via
the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability
allows attackers to cause a Denial of Service (DoS) via supplying a crafted
XML file.

CVE-2023-45322

libxml2 through 2.11.5 has a use-after-free that can only occur after a
certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. 

CVE-2024-25062

An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5.
When using the XML Reader interface with DTD validation and XInclude 
expansion enabled, processing crafted XML documents can lead to an 
xmlValidatePopElement use-after-free.


For Debian 10 buster, these problems have been fixed in version 2.9.4+dfsg1-7+deb10u9.

For Debian 8 jessie, these problems have been fixed in version 2.9.1+dfsg1-5+deb8u17.

We recommend that you upgrade your libxml2 packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.