download.lst |    4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

New commits:
commit 83891e5c1d2c2df862e58c3ac441852e2f5a5396
Author:     Xisco Fauli <[email protected]>
AuthorDate: Tue Sep 9 17:03:13 2025 +0200
Commit:     Stephan Bergmann <[email protected]>
CommitDate: Thu Oct 23 22:01:25 2025 +0200

    libxml2: upgrade to 2.14.6
    
    9de92ed78d8495527c5d7a4d0cc76c1f83768195.patch.1 has been fixed upstream
    
    Downloaded from 
https://download.gnome.org/sources/libxml2/2.14/libxml2-2.14.6.tar.xz
    
    Change-Id: Ibfd34613bc74644830b2e45c32c16462e7c7bd32
    Reviewed-on: https://gerrit.libreoffice.org/c/core/+/190720
    Tested-by: Jenkins
    Reviewed-by: Xisco Fauli <[email protected]>
    (cherry picked from commit 5e9caecd24636664d3de0a1eff06df540aa70fc4)
    Reviewed-on: https://gerrit.libreoffice.org/c/core/+/190723
    Reviewed-by: Adolfo Jayme Barrientos <[email protected]>
    (cherry picked from commit 4a96bf9864e040ae3afa958a76a8ec3cf7ab2487)
    Reviewed-on: https://gerrit.libreoffice.org/c/core/+/192537
    Reviewed-by: Michael Stahl <[email protected]>
    Tested-by: Jenkins CollaboraOffice <[email protected]>

diff --git a/download.lst b/download.lst
index fc12e5df66f7..5aa1a8a38305 100644
--- a/download.lst
+++ b/download.lst
@@ -527,8 +527,8 @@ XMLSEC_TARBALL := xmlsec1-1.3.2.tar.gz
 # three static lines
 # so that git cherry-pick
 # will not run into conflicts
-LIBXML_SHA256SUM := 
03d006f3537616833c16c53addcdc32a0eb20e55443cba4038307e3fa7d8d44b
-LIBXML_VERSION_MICRO := 5
+LIBXML_SHA256SUM := 
7ce458a0affeb83f0b55f1f4f9e0e55735dbfc1a9de124ee86fb4a66b597203a
+LIBXML_VERSION_MICRO := 6
 LIBXML_TARBALL := libxml2-2.14.$(LIBXML_VERSION_MICRO).tar.xz
 # three static lines
 # so that git cherry-pick
diff --git a/external/libxml2/9de92ed78d8495527c5d7a4d0cc76c1f83768195.patch.1 
b/external/libxml2/9de92ed78d8495527c5d7a4d0cc76c1f83768195.patch.1
deleted file mode 100644
index 5984d25e957d..000000000000
--- a/external/libxml2/9de92ed78d8495527c5d7a4d0cc76c1f83768195.patch.1
+++ /dev/null
@@ -1,64 +0,0 @@
-From 9de92ed78d8495527c5d7a4d0cc76c1f83768195 Mon Sep 17 00:00:00 2001
-From: Nick Wellnhofer <[email protected]>
-Date: Tue, 5 Aug 2025 22:26:27 +0200
-Subject: [PATCH] tree: Guard against atype corruption
-
-Always remove ids if `id` member is set.
-
-Untested, but this should fix CVE-2025-7425 reported against libxslt:
-
-https://gitlab.gnome.org/GNOME/libxslt/-/issues/140
----
- tree.c  | 8 ++++----
- valid.c | 2 +-
- 2 files changed, 5 insertions(+), 5 deletions(-)
-
-diff --git a/tree.c b/tree.c
-index 2e8df00b8..ddb8bdb3b 100644
---- a/tree.c
-+++ b/tree.c
-@@ -1892,8 +1892,8 @@ xmlFreeProp(xmlAttrPtr cur) {
-       xmlDeregisterNodeDefaultValue((xmlNodePtr)cur);
- 
-     /* Check for ID removal -> leading to invalid references ! */
--    if ((cur->doc != NULL) && (cur->atype == XML_ATTRIBUTE_ID)) {
--          xmlRemoveID(cur->doc, cur);
-+    if (cur->doc != NULL && cur->id != NULL) {
-+        xmlRemoveID(cur->doc, cur);
-     }
-     if (cur->children != NULL) xmlFreeNodeList(cur->children);
-     DICT_FREE(cur->name)
-@@ -2736,7 +2736,7 @@ xmlNodeSetDoc(xmlNodePtr node, xmlDocPtr doc) {
-              * TODO: ID attributes should also be added to the new
-              * document, but it's not clear how to handle clashes.
-              */
--            if (attr->atype == XML_ATTRIBUTE_ID)
-+            if (attr->id != NULL)
-                 xmlRemoveID(oldDoc, attr);
- 
-             break;
-@@ -6919,7 +6919,7 @@ xmlSetNsProp(xmlNodePtr node, xmlNsPtr ns, const xmlChar 
*name,
-                 return(NULL);
-         }
- 
--      if (prop->atype == XML_ATTRIBUTE_ID) {
-+      if (prop->id != NULL) {
-           xmlRemoveID(node->doc, prop);
-           prop->atype = XML_ATTRIBUTE_ID;
-       }
-diff --git a/valid.c b/valid.c
-index 34b6757cb..e625f0c1b 100644
---- a/valid.c
-+++ b/valid.c
-@@ -4296,7 +4296,7 @@ xmlValidateOneAttribute(xmlValidCtxtPtr ctxt, xmlDocPtr 
doc,
-              attr->name, elem->name, NULL);
-       return(0);
-     }
--    if (attr->atype == XML_ATTRIBUTE_ID)
-+    if (attr->id != NULL)
-         xmlRemoveID(doc, attr);
-     attr->atype = attrDecl->atype;
- 
--- 
-GitLab
-
diff --git a/external/libxml2/UnpackedTarball_libxml2.mk 
b/external/libxml2/UnpackedTarball_libxml2.mk
index 593556dbc532..223577f7c037 100644
--- a/external/libxml2/UnpackedTarball_libxml2.mk
+++ b/external/libxml2/UnpackedTarball_libxml2.mk
@@ -23,7 +23,6 @@ $(eval $(call gb_UnpackedTarball_add_patches,libxml2,\
        $(if $(gb_Module_CURRENTMODULE_SYMBOLS_ENABLED), \
                external/libxml2/libxml2-icu-sym.patch.0, \
                external/libxml2/libxml2-icu.patch.0) \
-       external/libxml2/9de92ed78d8495527c5d7a4d0cc76c1f83768195.patch.1 \
 ))
 
 $(eval $(call 
gb_UnpackedTarball_add_file,libxml2,xml2-config.in,external/libxml2/xml2-config.in))
commit 94a106f77c4561c006ba10cf691a0d281add60c3
Author:     Michael Stahl <[email protected]>
AuthorDate: Thu Aug 7 16:28:20 2025 +0200
Commit:     Stephan Bergmann <[email protected]>
CommitDate: Thu Oct 23 22:01:11 2025 +0200

    libxml2: add upstream patch for CVE-2025-7425
    
    Change-Id: I84110fc1ed54eac4a0ce4d8b8070a031c761fb39
    Reviewed-on: https://gerrit.libreoffice.org/c/core/+/189104
    Tested-by: Jenkins CollaboraOffice <[email protected]>
    Reviewed-by: Caolán McNamara <[email protected]>
    (cherry picked from commit 88e2be781bc22f8500f57c84cec572ead8af32c4)
    Reviewed-on: https://gerrit.libreoffice.org/c/core/+/192536
    Reviewed-by: Stephan Bergmann <[email protected]>

diff --git a/external/libxml2/9de92ed78d8495527c5d7a4d0cc76c1f83768195.patch.1 
b/external/libxml2/9de92ed78d8495527c5d7a4d0cc76c1f83768195.patch.1
new file mode 100644
index 000000000000..5984d25e957d
--- /dev/null
+++ b/external/libxml2/9de92ed78d8495527c5d7a4d0cc76c1f83768195.patch.1
@@ -0,0 +1,64 @@
+From 9de92ed78d8495527c5d7a4d0cc76c1f83768195 Mon Sep 17 00:00:00 2001
+From: Nick Wellnhofer <[email protected]>
+Date: Tue, 5 Aug 2025 22:26:27 +0200
+Subject: [PATCH] tree: Guard against atype corruption
+
+Always remove ids if `id` member is set.
+
+Untested, but this should fix CVE-2025-7425 reported against libxslt:
+
+https://gitlab.gnome.org/GNOME/libxslt/-/issues/140
+---
+ tree.c  | 8 ++++----
+ valid.c | 2 +-
+ 2 files changed, 5 insertions(+), 5 deletions(-)
+
+diff --git a/tree.c b/tree.c
+index 2e8df00b8..ddb8bdb3b 100644
+--- a/tree.c
++++ b/tree.c
+@@ -1892,8 +1892,8 @@ xmlFreeProp(xmlAttrPtr cur) {
+       xmlDeregisterNodeDefaultValue((xmlNodePtr)cur);
+ 
+     /* Check for ID removal -> leading to invalid references ! */
+-    if ((cur->doc != NULL) && (cur->atype == XML_ATTRIBUTE_ID)) {
+-          xmlRemoveID(cur->doc, cur);
++    if (cur->doc != NULL && cur->id != NULL) {
++        xmlRemoveID(cur->doc, cur);
+     }
+     if (cur->children != NULL) xmlFreeNodeList(cur->children);
+     DICT_FREE(cur->name)
+@@ -2736,7 +2736,7 @@ xmlNodeSetDoc(xmlNodePtr node, xmlDocPtr doc) {
+              * TODO: ID attributes should also be added to the new
+              * document, but it's not clear how to handle clashes.
+              */
+-            if (attr->atype == XML_ATTRIBUTE_ID)
++            if (attr->id != NULL)
+                 xmlRemoveID(oldDoc, attr);
+ 
+             break;
+@@ -6919,7 +6919,7 @@ xmlSetNsProp(xmlNodePtr node, xmlNsPtr ns, const xmlChar 
*name,
+                 return(NULL);
+         }
+ 
+-      if (prop->atype == XML_ATTRIBUTE_ID) {
++      if (prop->id != NULL) {
+           xmlRemoveID(node->doc, prop);
+           prop->atype = XML_ATTRIBUTE_ID;
+       }
+diff --git a/valid.c b/valid.c
+index 34b6757cb..e625f0c1b 100644
+--- a/valid.c
++++ b/valid.c
+@@ -4296,7 +4296,7 @@ xmlValidateOneAttribute(xmlValidCtxtPtr ctxt, xmlDocPtr 
doc,
+              attr->name, elem->name, NULL);
+       return(0);
+     }
+-    if (attr->atype == XML_ATTRIBUTE_ID)
++    if (attr->id != NULL)
+         xmlRemoveID(doc, attr);
+     attr->atype = attrDecl->atype;
+ 
+-- 
+GitLab
+
diff --git a/external/libxml2/UnpackedTarball_libxml2.mk 
b/external/libxml2/UnpackedTarball_libxml2.mk
index 223577f7c037..593556dbc532 100644
--- a/external/libxml2/UnpackedTarball_libxml2.mk
+++ b/external/libxml2/UnpackedTarball_libxml2.mk
@@ -23,6 +23,7 @@ $(eval $(call gb_UnpackedTarball_add_patches,libxml2,\
        $(if $(gb_Module_CURRENTMODULE_SYMBOLS_ENABLED), \
                external/libxml2/libxml2-icu-sym.patch.0, \
                external/libxml2/libxml2-icu.patch.0) \
+       external/libxml2/9de92ed78d8495527c5d7a4d0cc76c1f83768195.patch.1 \
 ))
 
 $(eval $(call 
gb_UnpackedTarball_add_file,libxml2,xml2-config.in,external/libxml2/xml2-config.in))

Reply via email to