DescriptionThe xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
Debian Bugs803942

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml2 (PTS)buster2.9.4+dfsg1-7+deb10u4fixed
buster (security)2.9.4+dfsg1-7+deb10u5fixed
bullseye (security), bullseye2.9.10+dfsg-6.7+deb11u3fixed
bookworm, sid2.9.14+dfsg-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml2sourcesqueeze(not affected)


[squeeze] - libxml2 <not-affected> (No LZMA/XZ support in version 2.7.8)
Upstream patch: (v2.9.3)
You can use "xmllint --version" to verify if libxml2 is compiled with "Lzma" support.
sid's 2.9.2+zdfsg1-4 claims to have "Lzma" support but it's broken in fact...
so it barfs on the problematic file (parser error : Start tag expected,
'<' not found) even though it does not have the fix yet. The next upstream
release will fix this issue and will restore XZ support.

Search for package or bug name: Reporting problems