First published: Mon May 13 2024(Updated: )
An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 | <2.11.8 | |
libxml2 | >2.12.0<2.12.7 | |
debian/libxml2 | <=2.9.10+dfsg-6.7+deb11u4<=2.9.10+dfsg-6.7+deb11u5<=2.9.14+dfsg-1.3~deb12u1<=2.12.7+dfsg+really2.9.14-0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34459 is classified as a moderate severity vulnerability due to the potential for buffer over-read errors.
To fix CVE-2024-34459, upgrade xmllint to version 2.11.8 or 2.12.7 or later.
CVE-2024-34459 affects xmllint versions earlier than 2.11.8 and versions between 2.12.0 and 2.12.6.
CVE-2024-34459 represents a buffer over-read vulnerability that affects the formatting of error messages.
As of now, there are no publicly reported exploits specifically targeting CVE-2024-34459.