CVE-2020-24977

NameCVE-2020-24977
DescriptionGNOME project libxml2 v2.9.10 has a global buffer over-read vulnerabil ...
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2369-1, ELA-280-1
Debian Bugs969529

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml2 (PTS)jessie, jessie (lts)2.9.1+dfsg1-5+deb8u9fixed
stretch2.9.4+dfsg1-2.2+deb9u2vulnerable
stretch (security)2.9.4+dfsg1-2.2+deb9u3fixed
buster2.9.4+dfsg1-7+deb10u1vulnerable
sid, bullseye2.9.10+dfsg-6.3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml2source(unstable)2.9.10+dfsg-6.2unimportant969529
libxml2sourcejessie2.9.1+dfsg1-5+deb8u9ELA-280-1
libxml2sourcestretch2.9.4+dfsg1-2.2+deb9u3DLA-2369-1

Notes

https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
The issue is specific and restricted to xmllint:
https://gitlab.gnome.org/GNOME/libxml2/-/issues/178#note_892545
and present before the 0b19f236a263 ("Fixed ICU to set flush correctly and
provide pivot buffer.") commit itself.
Crash in CLI tool, no security impact

Search for package or bug name: Reporting problems