JLSEC-2025-91

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-91.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-91.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-91
Upstream
Published
2025-10-17T17:40:51.659Z
Modified
2025-11-03T00:05:01.024715Z
Summary
Uncontrolled recursion in XPath evaluation in libxml2 up to and including version 2.9.14 allows a lo...
Details

Uncontrolled recursion in XPath evaluation in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions xmlXPathRunEval, xmlXPathCtxtCompile, and xmlXPathEvalExpr were resetting recursion depth to zero before making potentially recursive calls. When such functions were called recursively this could allow for uncontrolled recursion and lead to a stack overflow. These functions now preserve recursion depth across recursive calls, allowing recursion depth to be controlled.

Database specific
{
    "sources": [
        {
            "imported": "2025-10-28T18:09:09.651Z",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-9714",
            "modified": "2025-09-17T21:13:10.787Z",
            "id": "CVE-2025-9714",
            "published": "2025-09-10T19:15:42.707Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9714"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / XML2_jll

Package

Name
XML2_jll
Purl
pkg:julia/XML2_jll?uuid=02c8fc9c-b97f-50b9-bbe4-9be30ff0a78a

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.3+0