-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5949-1 security@debian.org https://www.debian.org/security/ Aron Xu June 26, 2025 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libxml2 CVE ID : CVE-2022-49043 CVE-2023-39615 CVE-2023-45322 CVE-2024-25062 CVE-2024-34459 CVE-2024-56171 CVE-2025-24928 CVE-2025-27113 CVE-2025-32414 CVE-2025-32415 Debian Bug : 1051230 1053629 1063234 1071162 1094238 1098320 1098321 1098322 1102521 1103511 Brief introduction Multiple memory related vulnerabilities, inlcuding use-after-free, out-of-bounds memory access and NULL pointer dereference, were discovered in GNOME XML Parser and Toolkit Library and its Python bindings, which may cause denial of service or other unintended behaviors. For the stable distribution (bookworm), these problems have been fixed in version 2.9.14+dfsg-1.3~deb12u2. We recommend that you upgrade your libxml2 packages. For the detailed security status of libxml2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libxml2 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEBLHAyuu1xqoC2aJ5NP8o68vMTMgFAmhcROsACgkQNP8o68vM TMhn1gf+OByJDh29orfLTvtuc0pAZEvNwUzsKKMixPBVf4Q79SVeAvPy6fwazu4n RoGVHX16N7VLlA3DcNyB9kjLaWAe6xiBrPEIFaPS0Gvxj7IJb33jxCgcsgLbJNyx zkr3Zmzt//AMPSA1eSO3J6baxouvq6zizVbwnN2QxNanwrXGXI1PI9OyHY0NNK6s hzDaoAsX3O138+jzuk8ynkcmqdyi47EpfRimG7uZ+xnD2CpcNI8OXgzEz1Fmr3Jj JGZO493BX1/mwC/6KB2hDTP7BVpIWYKRp2hRb3BEildoUYanCkcWzIMyUEvTGxD6 Gs0jobh0CHbfv3I6IJyr0v5rukYIVg== =kTcR -----END PGP SIGNATURE-----