CVE-2020-24977

NameCVE-2020-24977
DescriptionGNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2369-1
Debian Bugs969529

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml2 (PTS)buster2.9.4+dfsg1-7+deb10u4fixed
buster (security)2.9.4+dfsg1-7+deb10u6fixed
bullseye (security), bullseye2.9.10+dfsg-6.7+deb11u4fixed
bookworm2.9.14+dfsg-1.3~deb12u1fixed
sid, trixie2.9.14+dfsg-1.3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml2sourcestretch2.9.4+dfsg1-2.2+deb9u3DLA-2369-1
libxml2sourcebuster2.9.4+dfsg1-7+deb10u2
libxml2source(unstable)2.9.10+dfsg-6.2unimportant969529

Notes

https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
The issue is specific and restricted to xmllint:
https://gitlab.gnome.org/GNOME/libxml2/-/issues/178#note_892545
and present before the 0b19f236a263 ("Fixed ICU to set flush correctly and
provide pivot buffer.") commit itself.
Crash in CLI tool, no security impact

Search for package or bug name: Reporting problems