JLSEC-2025-83

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-83.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-83.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-83
Upstream
Published
2025-10-17T17:40:51.659Z
Modified
2025-11-03T00:19:39.529863Z
Summary
An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5
Details

An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "id": "CVE-2024-25062",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-25062",
            "imported": "2025-10-28T18:09:09.638Z",
            "published": "2024-02-04T16:15:45.120Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25062",
            "modified": "2025-05-09T18:16:03.707Z"
        }
    ]
}
References

Affected packages

Julia / XML2_jll

Package

Name
XML2_jll
Purl
pkg:julia/XML2_jll?uuid=02c8fc9c-b97f-50b9-bbe4-9be30ff0a78a

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.12.5+0