Vulnerability DatabaseGHSA-vvfq-8hwr-qm4m

GHSA-vvfq-8hwr-qm4m
Ruby vulnerability analysis and mitigation

Overview

A security vulnerability was identified in Nokogiri's packaged libxml2 library, leading to the release of version 1.18.3 which updates libxml2 to version 2.13.6. This update addresses two distinct vulnerabilities: CVE-2025-24928 and CVE-2024-56171. The issue affects Nokogiri versions below 1.18.3 and was published on February 18, 2025 (GitHub Advisory).

Technical details

The vulnerability encompasses two distinct issues in libxml2: First, a stack-buffer overflow vulnerability (CVE-2025-24928) that occurs during DTD validation error reporting when processing input containing long QName prefixes (approximately 3KB in length). Second, a use-after-free vulnerability (CVE-2024-56171) that manifests during XML Schema validation, particularly when processing untrusted XML Schemas or when validating untrusted documents against trusted Schemas that utilize xsd:keyref with recursively defined types having additional identity constraints (GitHub Advisory).

Impact

The vulnerabilities can lead to two types of security issues: For CVE-2025-24928, attackers could potentially trigger a stack-buffer overflow by crafting XML documents with extremely long QName prefixes during DTD validation. For CVE-2024-56171, attackers could cause a use-after-free condition when processing specially crafted XML Schemas or documents, particularly those involving xsd:keyref with recursive type definitions (GitHub Advisory).

Mitigation and workarounds

The recommended mitigation is to upgrade to Nokogiri version 1.18.3 or later, which includes the patched libxml2 version 2.13.6. This update addresses both CVE-2025-24928 and CVE-2024-56171 (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management