Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: libxml2

Found 10 matching suggestions

Untriaged
updated 1 week, 5 days ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed
    5 packages
    • sbclPackages.cl-libxml2
    • perlPackages.AlienLibxml2
    • perl538Packages.AlienLibxml2
    • perl540Packages.AlienLibxml2
    • tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"
Libxml2: memory leak leading to local denial of service in xmllint interactive shell

A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.

Affected products

rhcos
libxml2

Matching in nixpkgs

Package maintainers

Published
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    8 packages
    • tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"
    • perl540Packages.AlienLibxml2
    • perl538Packages.AlienLibxml2
    • python313Packages.libxml2
    • python312Packages.libxml2
    • perlPackages.AlienLibxml2
    • sbclPackages.cl-libxml2
    • libxml2Python
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing

A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.

Affected products

rhcos
libxml2

Matching in nixpkgs

Package maintainers

Upstream issue: https://gitlab.gnome.org/GNOME/libxml2/-/issues/1018
Upstream patch: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1961208e958ca22f80a0b4e4c9d71cfa050aa982
Published
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    8 packages
    • libxml2Python
    • sbclPackages.cl-libxml2
    • perlPackages.AlienLibxml2
    • python312Packages.libxml2
    • python313Packages.libxml2
    • perl538Packages.AlienLibxml2
    • perl540Packages.AlienLibxml2
    • tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libxml2: unbounded relaxng include recursion leading to stack overflow

A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.

Affected products

rhcos
libxml2

Matching in nixpkgs

Package maintainers

Fix MR: https://gitlab.gnome.org/GNOME/libxml2/-/merge_requests/374
Published
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    8 packages
    • libxml2Python
    • sbclPackages.cl-libxml2
    • perlPackages.AlienLibxml2
    • python312Packages.libxml2
    • python313Packages.libxml2
    • perl538Packages.AlienLibxml2
    • perl540Packages.AlienLibxml2
    • tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libxml2: libxml2: denial of service via crafted xml catalogs

A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.

Affected products

rhcos
libxml2

Matching in nixpkgs

Package maintainers

Fix MR: https://gitlab.gnome.org/GNOME/libxml2/-/merge_requests/368
Untriaged
created 5 months ago
Stack overflow in libxml2

Uncontrolled recursion in XPath evaluation in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions `xmlXPathRunEval`, `xmlXPathCtxtCompile`, and `xmlXPathEvalExpr` were resetting recursion depth to zero before making potentially recursive calls. When such functions were called recursively this could allow for uncontrolled recursion and lead to a stack overflow. These functions now preserve recursion depth across recursive calls, allowing recursion depth to be controlled.

Affected products

libxml2
  • <2.12.7+dfsg+really2.9.14-0.4ubuntu0.3
  • <2.9.3+dfsg1-1ubuntu0.7+esm10
  • <2.9.1+dfsg1-3ubuntu4.13+esm9
  • <2.10.0
  • <2.9.14+dfsg-1.3ubuntu3.5
  • <2.9.4+dfsg1-6.1ubuntu1.9+esm5
  • <2.9.10+dfsg-5ubuntu0.20.04.10+esm2
  • <2.9.13+dfsg-1ubuntu0.9

Matching in nixpkgs

pkgs.libxml2

XML parsing library for C

  • nixos-unstable -

Package maintainers

Untriaged
created 5 months ago
Libxml: heap use after free (uaf) leads to denial of service (dos)

A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.

Affected products

rhcos
  • *
libxml2
  • <2.15.0
  • *
Red Hat JBoss Core Services 2.4.62.SP2
web-terminal/web-terminal-tooling-rhel9
  • *
cert-manager/jetstack-cert-manager-rhel9
  • *
web-terminal/web-terminal-rhel9-operator
  • *
openshift-serverless-1/logic-rhel8-operator
  • *
openshift-serverless-1/logic-operator-bundle
  • *
insights-proxy/insights-proxy-container-rhel9
  • *
openshift-serverless-1/logic-swf-builder-rhel8
  • *
openshift-serverless-1/logic-swf-devmode-rhel8
  • *
compliance/openshift-file-integrity-rhel8-operator
  • *
openshift-serverless-1/logic-db-migrator-tool-rhel8
  • *
openshift-serverless-1/logic-management-console-rhel8
  • *
openshift-serverless-1/logic-data-index-ephemeral-rhel8
  • *
openshift-serverless-1/logic-data-index-postgresql-rhel8
  • *
openshift-serverless-1/logic-jobs-service-ephemeral-rhel8
  • *
openshift-serverless-1/logic-jobs-service-postgresql-rhel8
  • *
openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8
  • *
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
  • *

Matching in nixpkgs

pkgs.libxml2

XML parsing library for C

  • nixos-unstable -

Package maintainers

Untriaged
created 5 months ago
Libxml2: stack buffer overflow in xmllint interactive shell command handling

A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.

Affected products

rhcos
libxml2
  • <2.14.5

Matching in nixpkgs

pkgs.libxml2

XML parsing library for C

  • nixos-unstable -

Package maintainers

Untriaged
created 5 months ago
Libxml: null pointer dereference leads to denial of service (dos)

A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.

Affected products

libxml2
  • <2.15.0
  • *
Red Hat JBoss Core Services 2.4.62.SP2

Matching in nixpkgs

pkgs.libxml2

XML parsing library for C

  • nixos-unstable -

Package maintainers

Untriaged
created 5 months ago
Libxml: type confusion leads to denial of service (dos)

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

Affected products

rhcos
  • *
libxml2
  • <2.15.0
  • *
discovery/discovery-server-rhel9
  • *
Red Hat JBoss Core Services 2.4.62.SP2
web-terminal/web-terminal-tooling-rhel9
  • *
cert-manager/jetstack-cert-manager-rhel9
  • *
web-terminal/web-terminal-rhel9-operator
  • *
openshift-serverless-1/logic-rhel8-operator
  • *
openshift-serverless-1/logic-operator-bundle
  • *
insights-proxy/insights-proxy-container-rhel9
  • *
openshift-serverless-1/logic-swf-builder-rhel8
  • *
openshift-serverless-1/logic-swf-devmode-rhel8
  • *
compliance/openshift-file-integrity-rhel8-operator
  • *
openshift-serverless-1/logic-db-migrator-tool-rhel8
  • *
registry.redhat.io/discovery/discovery-server-rhel9
  • *
openshift-serverless-1/logic-management-console-rhel8
  • *
openshift-serverless-1/logic-data-index-ephemeral-rhel8
  • *
openshift-serverless-1/logic-data-index-postgresql-rhel8
  • *
openshift-serverless-1/logic-jobs-service-ephemeral-rhel8
  • *
openshift-serverless-1/logic-jobs-service-postgresql-rhel8
  • *
openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8
  • *
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
  • *

Matching in nixpkgs

pkgs.libxml2

XML parsing library for C

  • nixos-unstable -

Package maintainers

Untriaged
created 5 months ago
Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

Affected products

rhcos
  • *
libxml2
  • <2.14.4
  • *
discovery/discovery-server-rhel9
  • *
Red Hat JBoss Core Services 2.4.62.SP2
insights-proxy/insights-proxy-container-rhel9
  • *
registry.redhat.io/discovery/discovery-server-rhel9
  • *
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
  • *

Matching in nixpkgs

pkgs.libxml2

XML parsing library for C

  • nixos-unstable -

Package maintainers