JLSEC-2025-71

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-71.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-71.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-71
Upstream
Published
2025-10-17T17:40:51.659Z
Modified
2025-11-03T00:18:59.749100Z
Summary
There's a flaw in libxml2 in versions before 2.9.11
Details

There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "id": "CVE-2021-3518",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-3518",
            "imported": "2025-10-28T18:09:07.777Z",
            "published": "2021-05-18T12:15:08.043Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518",
            "modified": "2024-11-21T06:21:44.453Z"
        }
    ]
}
References

Affected packages

Julia / XML2_jll

Package

Name
XML2_jll
Purl
pkg:julia/XML2_jll?uuid=02c8fc9c-b97f-50b9-bbe4-9be30ff0a78a

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.9.12+0