libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is "I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail."
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2023/10/06/5 | Mailing List Patch Third Party Advisory |
| https://gitlab.gnome.org/GNOME/libxml2/-/issues/344 | Issue Tracking Patch Vendor Advisory |
| https://gitlab.gnome.org/GNOME/libxml2/-/issues/583 | Issue Tracking Patch Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2023/10/06/5 | Mailing List Patch Third Party Advisory |
| https://gitlab.gnome.org/GNOME/libxml2/-/issues/344 | Issue Tracking Patch Vendor Advisory |
| https://gitlab.gnome.org/GNOME/libxml2/-/issues/583 | Issue Tracking Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2025/02/msg00028.html |
Configurations
History
03 Nov 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 08:26
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2023/10/06/5 - Mailing List, Patch, Third Party Advisory | |
| References | () https://gitlab.gnome.org/GNOME/libxml2/-/issues/344 - Issue Tracking, Patch, Vendor Advisory | |
| References | () https://gitlab.gnome.org/GNOME/libxml2/-/issues/583 - Issue Tracking, Patch, Vendor Advisory |
07 Nov 2023, 04:21
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is "I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail." |
11 Oct 2023, 18:13
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CPE | cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:* | |
| First Time |
Xmlsoft
Xmlsoft libxml2 |
|
| References | (MLIST) http://www.openwall.com/lists/oss-security/2023/10/06/5 - Mailing List, Patch, Third Party Advisory | |
| References | (MISC) https://gitlab.gnome.org/GNOME/libxml2/-/issues/344 - Issue Tracking, Patch, Vendor Advisory | |
| References | (MISC) https://gitlab.gnome.org/GNOME/libxml2/-/issues/583 - Issue Tracking, Patch, Vendor Advisory | |
| CWE | CWE-416 |
07 Oct 2023, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
06 Oct 2023, 22:23
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-10-06 22:15
Updated : 2025-11-03 21:16
NVD link : CVE-2023-45322
Mitre link : CVE-2023-45322
CVE.ORG link : CVE-2023-45322
JSON object : View
Products Affected
xmlsoft
- libxml2
CWE
CWE-416
Use After Free
