libxml2 中的多个漏洞
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。直接写描述就行。
首先,我需要仔细阅读邮件内容。邮件来自Nick Wellnhofer,日期是2025年2月18日。他提到libxml2库修复了三个漏洞:CVE-2024-56171、CVE-2025-24928和一个未编号的
2025-2-18 17:5:0
Author: seclists.org(查看原文)
阅读量:4
收藏
oss-sec
mailing list archives
From: Nick Wellnhofer <wellnhofer () aevum de>
Date: Tue, 18 Feb 2025 17:56:31 +0100
These issues are fixed in 2.12.10, 2.13.6 and the upcoming 2.14.0 release. Older branches won't receive official
updates.
[CVE-2024-56171] Use-after-free in xmlSchemaIDCFillNodeTables
https://gitlab.gnome.org/GNOME/libxml2/-/issues/828
[CVE-2025-24928] Stack-buffer-overflow in xmlSnprintfElements
https://gitlab.gnome.org/GNOME/libxml2/-/issues/847
Null-deref in xmlPatMatch
https://gitlab.gnome.org/GNOME/libxml2/-/issues/861
Nick
Current thread:
- Multiple vulnerabilities in libxml2 Nick Wellnhofer (Feb 18)
文章来源: https://seclists.org/oss-sec/2025/q1/145
如有侵权请联系:admin#unsafe.sh