CVE Vulnerabilities

CVE-2025-24928

Stack-based Buffer Overflow

Published: Feb 18, 2025 | Modified: Nov 03, 2025
CVSS 3.x
7.7
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
7.8 IMPORTANT
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

Weakness

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).

Affected Software

NameVendorStart VersionEnd Version
Active_iq_unified_managerNetapp- (including)- (including)
Manageability_software_development_kitNetapp- (including)- (including)
OntapNetapp9 (including)9 (including)
Solidfire_&_hci_management_nodeNetapp- (including)- (including)
Libxml2Xmlsoft*2.12.10 (excluding)
Libxml2Xmlsoft2.13.0 (including)2.13.6 (excluding)
Red Hat Enterprise Linux 7 Extended Lifecycle SupportRedHatlibxml2-0:2.9.1-6.el7_9.9*
Red Hat Enterprise Linux 8RedHatlibxml2-0:2.9.7-19.el8_10*
Red Hat Enterprise Linux 8RedHatlibxml2-0:2.9.7-19.el8_10*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatlibxml2-0:2.9.7-9.el8_2.1*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatlibxml2-0:2.9.7-9.el8_4.5*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHatlibxml2-0:2.9.7-9.el8_4.5*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHatlibxml2-0:2.9.7-9.el8_4.5*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatlibxml2-0:2.9.7-13.el8_6.8*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatlibxml2-0:2.9.7-13.el8_6.8*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatlibxml2-0:2.9.7-13.el8_6.8*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatlibxml2-0:2.9.7-16.el8_8.7*
Red Hat Enterprise Linux 9RedHatlibxml2-0:2.9.13-6.el9_5.2*
Red Hat Enterprise Linux 9RedHatlibxml2-0:2.9.13-6.el9_5.2*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatlibxml2-0:2.9.13-1.el9_0.4*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatlibxml2-0:2.9.13-3.el9_2.6*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatlibxml2-0:2.9.13-9.el9_4*
Red Hat JBoss Core Services 2.4.62RedHatlibxml2*
Red Hat OpenShift Container Platform 4.12RedHatrhcos-412.86.202503310142-0*
Red Hat OpenShift Container Platform 4.13RedHatrhcos-413.92.202504070146-0*
Red Hat OpenShift Container Platform 4.14RedHatrhcos-414.92.202504010153-0*
Red Hat OpenShift Container Platform 4.15RedHatrhcos-415.92.202503190057-0*
Red Hat OpenShift Container Platform 4.16RedHatrhcos-416.94.202503252048-0*
Red Hat OpenShift Container Platform 4.17RedHatrhcos-417.94.202503241418-0*
Red Hat OpenShift Container Platform 4.18RedHatrhcos-418.94.202504080525-0*
Service Interconnect 1.4 for RHEL 9RedHatservice-interconnect/skupper-config-sync-rhel9:1.4.8-1*
Service Interconnect 1.4 for RHEL 9RedHatservice-interconnect/skupper-flow-collector-rhel9:1.4.8-1*
Service Interconnect 1.4 for RHEL 9RedHatservice-interconnect/skupper-operator-bundle:1.4.8-1*
Service Interconnect 1.4 for RHEL 9RedHatservice-interconnect/skupper-router-rhel9:2.4.3-9*
Service Interconnect 1.4 for RHEL 9RedHatservice-interconnect/skupper-service-controller-rhel9:1.4.8-1*
Service Interconnect 1.4 for RHEL 9RedHatservice-interconnect/skupper-site-controller-rhel9:1.4.8-1*
Service Interconnect 1 for RHEL 9RedHatskupper-config-sync-container-1.8.5-1*
Service Interconnect 1 for RHEL 9RedHatskupper-controller-podman-container-1.8.5-1*
Service Interconnect 1 for RHEL 9RedHatskupper-flow-collector-container-1.8.5-1*
Service Interconnect 1 for RHEL 9RedHatskupper-operator-bundle-container-1.8.5-2*
Service Interconnect 1 for RHEL 9RedHatskupper-router-container-2.7.5-2*
Service Interconnect 1 for RHEL 9RedHatskupper-service-controller-container-1.8.5-1*
Service Interconnect 1 for RHEL 9RedHatskupper-site-controller-container-1.8.5-1*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-data-science-pipelines-argo-argoexec-rhel8:sha256:ee01e89f98feb185f6cd59c564e590a13e4d8d9ea760cca8de51426eb71b83a1*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8:sha256:d7d4fa406e0fcf0507894a7676532b27f45be742467e603a86f98ea5d2615df8*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-data-science-pipelines-operator-controller-rhel8:sha256:a0f72ffefb2b74b488dd949493f5d295a39bb9c97f578bf219d0138601f65468*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-kf-notebook-controller-rhel8:sha256:2ba2b2c4db8bb334c50f4dfb54059f060361186900a44c06eed00b7a3c43977e*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-kuberay-operator-controller-rhel8:sha256:5394cd240a8857906803affec711959da8b8da4e9a7225ddaefe9736c98949b4*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-kueue-controller-rhel8:sha256:036af0457f091059551ff63563d5cf68f062297a5630a869bbf3398d5e97ffdc*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-mlmd-grpc-server-rhel8:sha256:5dcdcc2424602a69451f16d31dbfa1d43cb72c095ba561eb9076f0cd1e8182ed*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-ml-pipelines-driver-rhel8:sha256:2257fe7947959fd59346d2b322f7dbb471831880df659e57344b0d804c2c0099*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-ml-pipelines-launcher-rhel8:sha256:8783f8aaed686a63ed1f913364c85606b1447540608f5b7f45412ff0868a4f38*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-model-controller-rhel8:sha256:6cf74044ae8d5308a2dfe03fa5d81086c89302db7f4cdbe2f4174a1c48b77869*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-modelmesh-rhel8:sha256:c499a2c4a7860a1853adf3ebfbf154f3c03c478034a78566b82711373210af39*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-modelmesh-runtime-adapter-rhel8:sha256:4a7599f8a866eb169c9a62885906adbf6df0417c0be15857df1eef20cd9b1be2*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-notebook-controller-rhel8:sha256:4c5ff3496b2a2a739939d94ee9dafc02b682100785d228dc2fde480fb597b7a5*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-data-science-pipelines-argo-argoexec-rhel8:sha256:ee01e89f98feb185f6cd59c564e590a13e4d8d9ea760cca8de51426eb71b83a1*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8:sha256:d7d4fa406e0fcf0507894a7676532b27f45be742467e603a86f98ea5d2615df8*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-data-science-pipelines-operator-controller-rhel8:sha256:a0f72ffefb2b74b488dd949493f5d295a39bb9c97f578bf219d0138601f65468*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-kf-notebook-controller-rhel8:sha256:2ba2b2c4db8bb334c50f4dfb54059f060361186900a44c06eed00b7a3c43977e*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-kuberay-operator-controller-rhel8:sha256:65482864055021272a18b5b26792ab00cfa5fc9cc005d8d3a884cc82991506f3*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-kueue-controller-rhel8:sha256:7b70af8847b0806d8b43c399e2b3109f016fd864f5e9d30c44e2baca5d1359dc*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-mlmd-grpc-server-rhel8:sha256:5dcdcc2424602a69451f16d31dbfa1d43cb72c095ba561eb9076f0cd1e8182ed*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-ml-pipelines-driver-rhel8:sha256:efd039012559786deb3c521a130886c265e88d635e08baace2e573a9df270134*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-ml-pipelines-launcher-rhel8:sha256:27b113d96453c2054d4c965a963d2badba6daac235eddaf23234c76e87bcb069*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-model-controller-rhel8:sha256:6cf74044ae8d5308a2dfe03fa5d81086c89302db7f4cdbe2f4174a1c48b77869*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-modelmesh-rhel8:sha256:c499a2c4a7860a1853adf3ebfbf154f3c03c478034a78566b82711373210af39*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-modelmesh-runtime-adapter-rhel8:sha256:4a7599f8a866eb169c9a62885906adbf6df0417c0be15857df1eef20cd9b1be2*
Red Hat OpenShift AI 2.16RedHatrhoai/odh-notebook-controller-rhel8:sha256:4c5ff3496b2a2a739939d94ee9dafc02b682100785d228dc2fde480fb597b7a5*
Red Hat OpenShift distributed tracing 3.5.1RedHatrhosdt/opentelemetry-collector-rhel8:sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8*
Red Hat OpenShift distributed tracing 3.5.1RedHatrhosdt/opentelemetry-rhel8-operator:sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65*
Red Hat OpenShift distributed tracing 3.5.1RedHatrhosdt/opentelemetry-target-allocator-rhel8:sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81*
Red Hat Openshift Network Observability 1.8.1RedHatnetwork-observability/network-observability-rhel9-operator:sha256:5c284278b38c431f87b8ee743dabfd10ea24961dee76b7f8f3b3a84269a37993*
Libxml2Ubuntudevel*
Libxml2Ubuntuesm-infra-legacy/trusty*
Libxml2Ubuntuesm-infra/bionic*
Libxml2Ubuntuesm-infra/focal*
Libxml2Ubuntuesm-infra/xenial*
Libxml2Ubuntufocal*
Libxml2Ubuntujammy*
Libxml2Ubuntunoble*
Libxml2Ubuntuoracular*
Libxml2Ubuntuplucky*
Libxml2Ubuntuupstream*

Potential Mitigations

  • Use automatic buffer overflow detection mechanisms that are offered by certain compilers or compiler extensions. Examples include: the Microsoft Visual Studio /GS flag, Fedora/Red Hat FORTIFY_SOURCE GCC flag, StackGuard, and ProPolice, which provide various mechanisms including canary-based detection and range/index checking.
  • D3-SFCV (Stack Frame Canary Validation) from D3FEND [REF-1334] discusses canary-based detection in detail.
  • Run or compile the software using features or extensions that randomly arrange the positions of a program’s executable and libraries in memory. Because this makes the addresses unpredictable, it can prevent an attacker from reliably jumping to exploitable code.
  • Examples include Address Space Layout Randomization (ASLR) [REF-58] [REF-60] and Position-Independent Executables (PIE) [REF-64]. Imported modules may be similarly realigned if their default memory addresses conflict with other modules, in a process known as “rebasing” (for Windows) and “prelinking” (for Linux) [REF-1332] using randomly generated addresses. ASLR for libraries cannot be used in conjunction with prelink since it would require relocating the libraries at run-time, defeating the whole purpose of prelinking.
  • For more information on these techniques see D3-SAOR (Segment Address Offset Randomization) from D3FEND [REF-1335].

References