Source: libxml2 Version: 2.15.1+dfsg-0.3 Severity: important Tags: security upstream Forwarded: https://gitlab.gnome.org/GNOME/libxml2/-/issues/1012 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for libxml2. CVE-2025-12863[0]: | A flaw was found in the xmlSetTreeDoc() function of the libxml2 XML | parsing library. This function is responsible for updating document | pointers when XML nodes are moved between documents. Due to improper | handling of namespace references, a namespace pointer may remain | linked to a freed memory region when the original document is | destroyed. As a result, subsequent operations that access the | namespace can lead to a use-after-free condition, causing an | application crash. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-12863 https://www.cve.org/CVERecord?id=CVE-2025-12863 [1] https://gitlab.gnome.org/GNOME/libxml2/-/issues/1012 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

