First published: Fri Mar 14 2025(Updated: )
Last updated 19 March 2025
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libxslt | <1.1.43 | |
debian/libxslt | <=1.1.34-4+deb11u1<=1.1.35-1 | 1.1.34-4+deb11u2 1.1.35-1+deb12u1 1.1.35-1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-55549 has been classified as a high-severity vulnerability due to the potential for exploitation through a use-after-free condition.
To fix CVE-2024-55549, upgrade libxslt to version 1.1.43 or later as it addresses this vulnerability.
CVE-2024-55549 affects all versions of libxslt prior to 1.1.43.
In the context of CVE-2024-55549, a use-after-free issue occurs when the software attempts to access memory after it has been freed, leading to potential vulnerabilities.
Yes, if exploited, CVE-2024-55549 may allow attackers to execute arbitrary code on affected systems.