Debian: DSA-5391-1: libxml2 security update
Summary
CVE-2023-28484
A NULL pointer dereference flaw when parsing invalid XML schemas may
result in denial of service.
CVE-2023-29469
It was reported that when hashing empty strings which aren't
null-terminated, xmlDictComputeFastKey could produce inconsistent
results, which may lead to various logic or memory errors.
For the stable distribution (bullseye), these problems have been fixed in
version 2.9.10+dfsg-6.7+deb11u4.
We recommend that you upgrade your libxml2 packages.
For the detailed security status of libxml2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/source-package/libxml2
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/