Debian 10694 Published by

Debian GNU/Linux 11 (Bullseye) LTS has received two security updates for Snapcast and LibXML2:

[DLA 4252-1] snapcast security update
[DLA 4251-1] libxml2 security update




[SECURITY] [DLA 4252-1] snapcast security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-4252-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Daniel Leidert
July 27, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : snapcast
Version : 0.23.0+dfsg1-1+deb11u1
CVE ID : CVE-2023-36177

An RCE vulnerability was found in snapcast, a multi-room client-server
audio player.

CVE-2023-36177

Remote attackers can execute arbitrary code and gain sensitive
information via crafted requests in JSON-RPC-API. The fix disallows
the process stream type.

For Debian 11 bullseye, this problem has been fixed in version
0.23.0+dfsg1-1+deb11u1.

We recommend that you upgrade your snapcast packages.

For the detailed security status of snapcast please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/snapcast

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DLA 4251-1] libxml2 security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-4251-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Guilhem Moulin
July 26, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : libxml2
Version : 2.9.10+dfsg-6.7+deb11u8
CVE ID : CVE-2024-34459 CVE-2025-6021 CVE-2025-6170 CVE-2025-49794
CVE-2025-49796
Debian Bug : 1071162 1107720 1107755 1107938

Multiple security issues were found in libxml2, the GNOME XML library,
which could yield to denial of service or potentially arbitrary code
execution.

CVE-2024-34459

Zhineng Zhong discovered that formatting error messages with `xmllint
--htmlout` could result in a buffer over-read.

CVE-2025-6021

Ahmed Lekssays discovered an integer overflow issue in
`xmlBuildQName()` which could result in memory corruption or a
denial of service when processing crafted input.

CVE-2025-6170

Ahmed Lekssays discovered a stack-based buffer overflow issue in the
command-parsing logic of the interactive shell in xmllint.

CVE-2025-49794

Nikita Sveshnikov discovered a heap use-after-free issue in the
schematron. When processing XPath expressions in Schematron schema
elements ``, a pointer to freed memory is
returned and then accessed, leading to undefined behavior or
potential crashes.

CVE-2025-49796

Nikita Sveshnikov discovered a type confusion issue in the
schematron. Processing `sch:name` elements and accessing namespace
information may lead to leading to memory corruption or undefined
behavior.

For Debian 11 bullseye, these problems have been fixed in version
2.9.10+dfsg-6.7+deb11u8.

We recommend that you upgrade your libxml2 packages.

For the detailed security status of libxml2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libxml2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS