CVE-2018-14404

NameCVE-2018-14404
DescriptionA NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1524-1, DLA-2369-1
Debian Bugs901817

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml2 (PTS)buster2.9.4+dfsg1-7+deb10u4fixed
buster (security)2.9.4+dfsg1-7+deb10u6fixed
bullseye (security), bullseye2.9.10+dfsg-6.7+deb11u4fixed
bookworm2.9.14+dfsg-1.3~deb12u1fixed
trixie, sid2.9.14+dfsg-1.3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml2sourceexperimental2.9.9+dfsg1-1~exp1
libxml2sourcejessie2.9.1+dfsg1-5+deb8u7DLA-1524-1
libxml2sourcestretch2.9.4+dfsg1-2.2+deb9u3DLA-2369-1
libxml2sourcebuster2.9.4+dfsg1-7+deb10u1
libxml2source(unstable)2.9.10+dfsg-2low901817

Notes

https://gitlab.gnome.org/GNOME/libxml2/issues/5
https://gitlab.gnome.org/GNOME/libxml2/issues/10
https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594

Search for package or bug name: Reporting problems