CVE-2025-24928

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
mitreCNA
7.8 HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
CISA-ADPADP
---
---
CVEADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Debian logo
Debian Releases
Debian Product
Codename
libxml2
bullseye
vulnerable
bullseye (security)
2.9.10+dfsg-6.7+deb11u6
fixed
bookworm
vulnerable
sid
2.12.7+dfsg+really2.9.14-0.4
fixed
trixie
2.12.7+dfsg+really2.9.14-0.4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libxml2
oracular
Fixed 2.12.7+dfsg-3ubuntu0.2
released
noble
Fixed 2.9.14+dfsg-1.3ubuntu3.2
released
jammy
Fixed 2.9.13+dfsg-1ubuntu0.6
released
focal
Fixed 2.9.10+dfsg-5ubuntu0.20.04.9
released
bionic
Fixed 2.9.4+dfsg1-6.1ubuntu1.9+esm2
released
xenial
Fixed 2.9.3+dfsg1-1ubuntu0.7+esm7
released