Packages
- libxml2 - GNOME XML library
Details
It was discovered that libxml2 incorrectly handled certain memory
operations. A remote attacker could use this issue to cause libxml2 to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and
Ubuntu 18.04 LTS. (CVE-2022-49043)
It was discovered that the libxml2 xmllint tool incorrectly handled
certain memory operations. If a user or automated system were tricked into
running xmllint on a specially crafted xml file, a remote attacker could
cause xmllint to crash, resulting in a denial of service. This issue only
affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS.
(CVE-2024-34459)
It was discovered that libxml2 did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (
It was discovered that libxml2 incorrectly handled certain memory
operations. A remote attacker could use this issue to cause libxml2 to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and
Ubuntu 18.04 LTS. (CVE-2022-49043)
It was discovered that the libxml2 xmllint tool incorrectly handled
certain memory operations. If a user or automated system were tricked into
running xmllint on a specially crafted xml file, a remote attacker could
cause xmllint to crash, resulting in a denial of service. This issue only
affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS.
(CVE-2024-34459)
It was discovered that libxml2 did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2024-56171)
It was discovered that libxml2 could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. (CVE-2025-24928)
It was discovered that libxml2 could be made to dereference invalid memory.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2025-27113)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
24.10 oracular | libxml2 – 2.12.7+dfsg-3ubuntu0.2 | ||
24.04 noble | libxml2 – 2.9.14+dfsg-1.3ubuntu3.2 | ||
22.04 jammy | libxml2 – 2.9.13+dfsg-1ubuntu0.6 | ||
20.04 focal | libxml2 – 2.9.10+dfsg-5ubuntu0.20.04.9 | ||
18.04 bionic | libxml2 – 2.9.4+dfsg1-6.1ubuntu1.9+esm2 | ||
16.04 xenial | libxml2 – 2.9.3+dfsg1-1ubuntu0.7+esm7 | ||
14.04 trusty | libxml2 – 2.9.1+dfsg1-3ubuntu4.13+esm7 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.