NA

CVE-2024-25062

Published: 04/02/2024 Updated: 13/02/2024
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

An issue exists in libxml2 prior to 2.11.7 and 2.12.x prior to 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xmlsoft libxml2

Vendor Advisories

Debian Bug report logs - #1063234 libxml2: CVE-2024-25062 Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 5 Feb 2024 20:06:02 UTC Severity: important Tags: security, upstream Fo ...
Description<!---->A use-after-free flaw was found in libxml2 When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-freeA use-after-free flaw was found in libxml2 When using the XML Reader interface with DTD validation and XInclude ex ...