![]() |
|
Message-Id: <E4AC96C8-D6CB-402C-8716-B20179C4005C@aevum.de> Date: Tue, 18 Feb 2025 17:56:31 +0100 From: Nick Wellnhofer <wellnhofer@...um.de> To: oss-security@...ts.openwall.com Subject: Multiple vulnerabilities in libxml2 These issues are fixed in 2.12.10, 2.13.6 and the upcoming 2.14.0 release. Older branches won't receive official updates. [CVE-2024-56171] Use-after-free in xmlSchemaIDCFillNodeTables https://gitlab.gnome.org/GNOME/libxml2/-/issues/828 [CVE-2025-24928] Stack-buffer-overflow in xmlSnprintfElements https://gitlab.gnome.org/GNOME/libxml2/-/issues/847 Null-deref in xmlPatMatch https://gitlab.gnome.org/GNOME/libxml2/-/issues/861 Nick
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.