CVE-2025-26434

NameCVE-2025-26434
DescriptionIn libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml2 (PTS)bullseye2.9.10+dfsg-6.7+deb11u4fixed
bullseye (security)2.9.10+dfsg-6.7+deb11u8fixed
bookworm, bookworm (security)2.9.14+dfsg-1.3~deb12u4fixed
trixie (security), trixie2.12.7+dfsg+really2.9.14-2.1+deb13u1fixed
forky, sid2.14.5+dfsg-0.2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml2source(unstable)(not affected)

Notes

- libxml2 <not-affected> (Vulnerable code not in a Debian released version)
https://source.android.com/docs/security/bulletin/android-16
https://gitlab.gnome.org/GNOME/libxml2/-/issues/797
Introduced by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/2adcde39206bbb0aa4d097fe62162400df5cf360 (v2.14.0)
Fixed by: https://gitlab.gnome.org/GNOME/libxml2/commit/5e7874015ef5ed8b2705eb2f7b0960f56f7760ea (v2.14.0)

Search for package or bug name: Reporting problems