ELA-837-1 libxml2 security update

Multiple Vulnerabilities

2023-04-20
Packagelibxml2
Version2.9.1+dfsg1-5+deb8u15 (jessie), 2.9.4+dfsg1-2.2+deb9u10 (stretch)
Related CVEs CVE-2017-5130 CVE-2017-5969 CVE-2023-28484 CVE-2023-29469


Multiple issues were found in libxml2, the GNOME XML library, which possibly allows an remote attacker to trigger a potential heap memory corruption or trigger a denial of service or other unspecified impact.

The Jessie update 2.9.1+dfsg1-5+deb8u15 fixes all mentioned CVEs. The Stretch update 2.9.4+dfsg1-2.2+deb9u10 fixes CVE-2023-28484 and CVE-2023-29469, as the other have been fixed by an previous upload – see DLA-2972-1 for details.

CVE-2017-5130

An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as used in
Google Chrome prior to 62.0.3202.62 and other products, allowed a remote
attacker to potentially exploit heap corruption via a crafted XML file.

CVE-2017-5969

libxml2 2.9.4, when used in recover mode, allows one to cause a denial
of service (NULL pointer dereference) via a crafted XML document.

CVE-2023-28484

NULL dereference in xmlSchemaFixupComplexType.

CVE-2023-29469

Hashing of empty dict strings isn't deterministic.


For Debian 8 jessie, these problems have been fixed in version 2.9.1+dfsg1-5+deb8u15.

For Debian 9 stretch, these problems have been fixed in version 2.9.4+dfsg1-2.2+deb9u10.

We recommend that you upgrade your libxml2 packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.