Closed
Description
Name: libxml2
CVEs: CVE-2024-56171, CVE-2025-24928, CVE-2025-27113
CVSSs: 7.8, 7.8, 2.9
Action Needed: update to >= 2.12.10, >= 2.13.6
Summary:
- CVE-2024-56171: libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.
- CVE-2025-24928: libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.
- CVE-2025-27113: libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.
refmap.gentoo: CVE-{2024-56171,2025-24928}, https://bugs.gentoo.org/949914, CVE-2025-27113: TBD
Metadata
Metadata
Assignees
Type
Projects
Status
Implemented