First published: Sun Feb 04 2024(Updated: )
An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libxml2 | <=2.9.10+dfsg-6.7+deb11u4<=2.9.10+dfsg-6.7+deb11u5<=2.9.14+dfsg-1.3~deb12u1<=2.9.14+dfsg-1.3 | 2.12.7+dfsg-3 |
redhat/libxml2 2.11.7 and libxml2 | <2.12.5 | 2.12.5 |
libxml2 | <2.11.7 | |
libxml2 | >=2.12.0<2.12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25062 is classified as a high severity vulnerability due to the potential for exploitation through crafted XML documents.
To address CVE-2024-25062, upgrade libxml2 to version 2.12.7 or later, or to 2.12.5 from Red Hat's distribution.
Versions of libxml2 before 2.11.7 and between 2.12.0 and 2.12.5 are affected by CVE-2024-25062.
CVE-2024-25062 is a use-after-free vulnerability that occurs during XML processing with DTD validation and XInclude expansion.
Yes, CVE-2024-25062 can be remotely exploited when processing maliciously crafted XML documents.