libxml2 中的多个漏洞
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。直接写描述就行。 首先,我需要仔细阅读邮件内容。邮件来自Nick Wellnhofer,日期是2025年2月18日。他提到libxml2库修复了三个漏洞:CVE-2024-56171、CVE-2025-24928和一个未编号的 2025-2-18 17:5:0 Author: seclists.org(查看原文) 阅读量:4 收藏

oss-sec logo

oss-sec mailing list archives


From: Nick Wellnhofer <wellnhofer () aevum de>
Date: Tue, 18 Feb 2025 17:56:31 +0100

These issues are fixed in 2.12.10, 2.13.6 and the upcoming 2.14.0 release. Older branches won't receive official 
updates.

[CVE-2024-56171] Use-after-free in xmlSchemaIDCFillNodeTables
https://gitlab.gnome.org/GNOME/libxml2/-/issues/828

[CVE-2025-24928] Stack-buffer-overflow in xmlSnprintfElements
https://gitlab.gnome.org/GNOME/libxml2/-/issues/847

Null-deref in xmlPatMatch
https://gitlab.gnome.org/GNOME/libxml2/-/issues/861

Nick

Current thread:

  • Multiple vulnerabilities in libxml2 Nick Wellnhofer (Feb 18)

文章来源: https://seclists.org/oss-sec/2025/q1/145
如有侵权请联系:admin#unsafe.sh