rhsa-2025:3453
Vulnerability from csaf_redhat
Published
2025-04-02 17:06
Modified
2025-04-11 01:59
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.62 security update
Notes
Topic
Red Hat JBoss Core Services Apache HTTP Server 2.4.62 is now available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.62 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* expat: parsing large tokens can trigger a denial of service (CVE-2023-52425)
* expat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490)
* libxml2: libxml2: Use-After-Free in libxml2 (CVE-2024-56171)
* libxml2: libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 (CVE-2025-24928)
* mod_http2: DoS by null pointer in websocket over HTTP/2 (CVE-2024-36387)
* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat JBoss Core Services Apache HTTP Server 2.4.62 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.62 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* expat: parsing large tokens can trigger a denial of service (CVE-2023-52425)\n* expat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490)\n* libxml2: libxml2: Use-After-Free in libxml2 (CVE-2024-56171)\n* libxml2: libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 (CVE-2025-24928)\n* mod_http2: DoS by null pointer in websocket over HTTP/2 (CVE-2024-36387)\n* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2025:3453", url: "https://access.redhat.com/errata/RHSA-2025:3453", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_release_notes/index", url: "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_release_notes/index", }, { category: "external", summary: "2262877", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2262877", }, { category: "external", summary: "2294581", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2294581", }, { category: "external", summary: "2295006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2295006", }, { category: "external", summary: "2308615", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2308615", }, { category: "external", summary: "2346416", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2346416", }, { category: "external", summary: "2346421", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2346421", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3453.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.62 security update", tracking: { current_release_date: "2025-04-11T01:59:16+00:00", generator: { date: "2025-04-11T01:59:16+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.2", }, }, id: "RHSA-2025:3453", initial_release_date: "2025-04-02T17:06:49+00:00", revision_history: [ { date: "2025-04-02T17:06:49+00:00", number: "1", summary: "Initial version", }, { date: "2025-04-02T17:06:49+00:00", number: "2", summary: "Last updated version", }, { date: "2025-04-11T01:59:16+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Text-Only JBCS", product: { name: "Text-Only JBCS", product_id: "Text-Only JBCS", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1", }, }, }, ], category: "product_family", name: "Red Hat JBoss Core Services", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2023-52425", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, discovery_date: "2024-02-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2262877", }, ], notes: [ { category: "description", text: "A flaw was found in Expat (libexpat). When parsing a large token that requires multiple buffer fills to complete, Expat has to re-parse the token from start numerous times. This process may trigger excessive resource consumption, leading to a denial of service.", title: "Vulnerability description", }, { category: "summary", text: "expat: parsing large tokens can trigger a denial of service", title: "Vulnerability summary", }, { category: "other", text: "The identified flaw in Expat presents a moderate severity issue due to its potential to facilitate resource exhaustion attacks, particularly in scenarios involving parsing large tokens requiring multiple buffer fills. As Expat repeatedly re-parses such tokens from the beginning, it results in disproportionate resource consumption, leading to a denial-of-service (DoS) condition. While the impact is significant, the exploitation requires specific conditions, such as parsing large tokens, which may not always align with typical usage patterns.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Text-Only JBCS", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2023-52425", }, { category: "external", summary: "RHBZ#2262877", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2262877", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2023-52425", url: "https://www.cve.org/CVERecord?id=CVE-2023-52425", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-52425", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-52425", }, ], release_date: "2024-02-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2025-04-02T17:06:49+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "Text-Only JBCS", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2025:3453", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "Text-Only JBCS", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "Text-Only JBCS", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: parsing large tokens can trigger a denial of service", }, { cve: "CVE-2024-5535", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2024-06-27T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2294581", }, ], notes: [ { category: "description", text: "A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the 'no overlap' response in ALPN or uses the output as the opportunistic protocol in NPN.", title: "Vulnerability description", }, { category: "summary", text: "openssl: SSL_select_next_proto buffer overread", title: "Vulnerability summary", }, { category: "other", text: "The FIPS modules in versions 3.3, 3.2, 3.1, and 3.0 are not affected by this issue.\nThe packages shim and shim-unsigned-x64 are not impacted by this CVE, as the affected OpenSSL code path is not utilized.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Text-Only JBCS", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2024-5535", }, { category: "external", summary: "RHBZ#2294581", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2294581", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2024-5535", url: "https://www.cve.org/CVERecord?id=CVE-2024-5535", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2024-5535", url: "https://nvd.nist.gov/vuln/detail/CVE-2024-5535", }, { category: "external", summary: "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL", url: "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL", }, ], release_date: "2024-06-27T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2025-04-02T17:06:49+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "Text-Only JBCS", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2025:3453", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "Text-Only JBCS", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "Text-Only JBCS", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "openssl: SSL_select_next_proto buffer overread", }, { cve: "CVE-2024-36387", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2024-07-01T19:20:21+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2295006", }, ], notes: [ { category: "description", text: "A flaw was found in the Apache HTTP Server. Serving WebSocket protocol upgrades over an HTTP/2 connection could result in a NULL pointer dereference, leading to a crash of the server process.", title: "Vulnerability description", }, { category: "summary", text: "mod_http2: DoS by null pointer in websocket over HTTP/2", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Text-Only JBCS", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2024-36387", }, { category: "external", summary: "RHBZ#2295006", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2295006", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2024-36387", url: "https://www.cve.org/CVERecord?id=CVE-2024-36387", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2024-36387", url: "https://nvd.nist.gov/vuln/detail/CVE-2024-36387", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, ], release_date: "2024-07-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2025-04-02T17:06:49+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "Text-Only JBCS", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2025:3453", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "Text-Only JBCS", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "Text-Only JBCS", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "mod_http2: DoS by null pointer in websocket over HTTP/2", }, { cve: "CVE-2024-45490", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2024-08-30T03:20:06.675968+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2308615", }, ], notes: [ { category: "description", text: "A flaw was found in libexpat's xmlparse.c component. This vulnerability allows an attacker to cause improper handling of XML data by providing a negative length value to the XML_ParseBuffer function.", title: "Vulnerability description", }, { category: "summary", text: "libexpat: Negative Length Parsing Vulnerability in libexpat", title: "Vulnerability summary", }, { category: "other", text: "The CVE-2024-45490 vulnerability is rated as moderate severity because while it allows for memory corruption through improper argument handling in XML_ParseBuffer, the exploitability is limited. Specifically, it requires an unlikely scenario where the input passed to the function has a negative length (len < 0), which would typically not occur in well-formed applications. Moreover, while the impact includes denial of service (DoS), the conditions necessary for arbitrary code execution are non-trivial, requiring specific exploitation of memory corruption. Since it primarily leads to application crashes without an easily accessible attack vector for remote code execution, the risk is lower compared to higher-severity vulnerabilities that offer more direct pathways to exploitation.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Text-Only JBCS", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2024-45490", }, { category: "external", summary: "RHBZ#2308615", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2308615", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2024-45490", url: "https://www.cve.org/CVERecord?id=CVE-2024-45490", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2024-45490", url: "https://nvd.nist.gov/vuln/detail/CVE-2024-45490", }, { category: "external", summary: "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes", url: "https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes", }, { category: "external", summary: "https://github.com/libexpat/libexpat/issues/887", url: "https://github.com/libexpat/libexpat/issues/887", }, { category: "external", summary: "https://github.com/libexpat/libexpat/pull/890", url: "https://github.com/libexpat/libexpat/pull/890", }, ], release_date: "2024-08-30T03:15:03.757000+00:00", remediations: [ { category: "vendor_fix", date: "2025-04-02T17:06:49+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "Text-Only JBCS", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2025:3453", }, { category: "workaround", details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", product_ids: [ "Text-Only JBCS", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "Text-Only JBCS", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "libexpat: Negative Length Parsing Vulnerability in libexpat", }, { cve: "CVE-2024-56171", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2025-02-18T23:01:25.366636+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2346416", }, ], notes: [ { category: "description", text: "A flaw was found in libxml2. This vulnerability allows a use-after-free via a crafted XML document validated against an XML schema with certain identity constraints or a crafted XML schema.", title: "Vulnerability description", }, { category: "summary", text: "libxml2: Use-After-Free in libxml2", title: "Vulnerability summary", }, { category: "other", text: "This vulnerability is rated as important because it involves a use-after-free flaw in the xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables functions. A maliciously crafted XML document or schema, containing specific identity constraints, can be used to trigger this vulnerability and potentially gain unauthorized access or cause a denial-of-service condition.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Text-Only JBCS", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2024-56171", }, { category: "external", summary: "RHBZ#2346416", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2346416", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2024-56171", url: "https://www.cve.org/CVERecord?id=CVE-2024-56171", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2024-56171", url: "https://nvd.nist.gov/vuln/detail/CVE-2024-56171", }, { category: "external", summary: "https://gitlab.gnome.org/GNOME/libxml2/-/issues/828", url: "https://gitlab.gnome.org/GNOME/libxml2/-/issues/828", }, ], release_date: "2025-02-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2025-04-02T17:06:49+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "Text-Only JBCS", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2025:3453", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "Text-Only JBCS", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "libxml2: Use-After-Free in libxml2", }, { cve: "CVE-2025-24928", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, discovery_date: "2025-02-18T23:01:36.502916+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2346421", }, ], notes: [ { category: "description", text: "A flaw was found in libxml2. This vulnerability allows a stack-based buffer overflow via DTD validation of an untrusted document or untrusted DTD.", title: "Vulnerability description", }, { category: "summary", text: "libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2", title: "Vulnerability summary", }, { category: "other", text: "This vulnerability is rated as important because it involves a stack-based buffer overflow in the xmlSnprintfElements function within valid.c. Exploiting this issue requires DTD validation to occur on an untrusted document or untrusted DTD, making it a potential security risk for applications using libxml2 that do not adequately restrict DTD input.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Text-Only JBCS", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2025-24928", }, { category: "external", summary: "RHBZ#2346421", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2346421", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2025-24928", url: "https://www.cve.org/CVERecord?id=CVE-2025-24928", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2025-24928", url: "https://nvd.nist.gov/vuln/detail/CVE-2025-24928", }, { category: "external", summary: "https://gitlab.gnome.org/GNOME/libxml2/-/issues/847", url: "https://gitlab.gnome.org/GNOME/libxml2/-/issues/847", }, { category: "external", summary: "https://issues.oss-fuzz.com/issues/392687022", url: "https://issues.oss-fuzz.com/issues/392687022", }, ], release_date: "2025-02-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2025-04-02T17:06:49+00:00", details: "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "Text-Only JBCS", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2025:3453", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "Text-Only JBCS", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.