{"id":"USN-7896-1","summary":"libxml2 vulnerabilities","details":"It was discovered that the libxml2 Python bindings incorrectly handled\ncertain return values. An attacker could possibly use this issue to cause\nlibxml2 to crash, resulting in a denial of service. (CVE-2025-32414)\n\nIt was discovered that libxml2 incorrectly handled certain memory\noperations. A remote attacker could possibly use this issue to cause\nlibxml2 to crash, resulting in a denial of service. (CVE-2025-32415)\n\nIt was discovered that libxslt, used by libxml2, incorrectly handled\ncertain attributes. An attacker could use this issue to cause a crash,\nresulting in a denial of service, or possibly execute arbitrary code. This\nupdate adds a fix to libxml2 to mitigate the libxslt vulnerability.\n(CVE-2025-7425)","modified":"2026-02-10T04:50:36Z","published":"2025-11-27T14:21:02Z","related":["UBUNTU-CVE-2025-32414","UBUNTU-CVE-2025-32415","UBUNTU-CVE-2025-7425"],"upstream":["CVE-2025-32414","CVE-2025-32415","CVE-2025-7425","UBUNTU-CVE-2025-32414","UBUNTU-CVE-2025-32415","UBUNTU-CVE-2025-7425"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7896-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-7425"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-32414"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-32415"}],"affected":[{"package":{"name":"libxml2","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/libxml2@2.9.1+dfsg1-3ubuntu4.13+esm10?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.9.1+dfsg1-3ubuntu4.13+esm10"}]}],"versions":["2.9.1+dfsg1-3ubuntu2","2.9.1+dfsg1-3ubuntu3","2.9.1+dfsg1-3ubuntu4","2.9.1+dfsg1-3ubuntu4.1","2.9.1+dfsg1-3ubuntu4.2","2.9.1+dfsg1-3ubuntu4.3","2.9.1+dfsg1-3ubuntu4.4","2.9.1+dfsg1-3ubuntu4.5","2.9.1+dfsg1-3ubuntu4.6","2.9.1+dfsg1-3ubuntu4.7","2.9.1+dfsg1-3ubuntu4.8","2.9.1+dfsg1-3ubuntu4.9","2.9.1+dfsg1-3ubuntu4.10","2.9.1+dfsg1-3ubuntu4.11","2.9.1+dfsg1-3ubuntu4.12","2.9.1+dfsg1-3ubuntu4.13","2.9.1+dfsg1-3ubuntu4.13+esm1","2.9.1+dfsg1-3ubuntu4.13+esm2","2.9.1+dfsg1-3ubuntu4.13+esm3","2.9.1+dfsg1-3ubuntu4.13+esm4","2.9.1+dfsg1-3ubuntu4.13+esm5","2.9.1+dfsg1-3ubuntu4.13+esm6","2.9.1+dfsg1-3ubuntu4.13+esm7","2.9.1+dfsg1-3ubuntu4.13+esm8","2.9.1+dfsg1-3ubuntu4.13+esm9"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro","binaries":[{"binary_name":"libxml2","binary_version":"2.9.1+dfsg1-3ubuntu4.13+esm10"},{"binary_name":"libxml2-dev","binary_version":"2.9.1+dfsg1-3ubuntu4.13+esm10"},{"binary_name":"libxml2-utils","binary_version":"2.9.1+dfsg1-3ubuntu4.13+esm10"},{"binary_name":"python-libxml2","binary_version":"2.9.1+dfsg1-3ubuntu4.13+esm10"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7896-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2025-7425","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32414","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-32415","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]}}}],"schema_version":"1.7.3"}