libxml2-2.9.7-21.el8_10.1
エラータID: AXSA:2025-10455:09
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)
* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)
* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2025-49794
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
CVE-2025-49796
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
CVE-2025-6021
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
Update packages.
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
N/A
SRPMS
- libxml2-2.9.7-21.el8_10.1.src.rpm
MD5: a8d5b7db6575814e0a887ba046374040
SHA-256: 65d9259fb7ec2c261e95bff318a80c3c1aed809261d41303a131ca3bb9915c96
Size: 5.23 MB
Asianux Server 8 for x86_64
- libxml2-2.9.7-21.el8_10.1.i686.rpm
MD5: a815dc0040f0da5b8f08c4d3fef3df06
SHA-256: a073632f4915d6cac39943270ecf57db7b3755e7d76a2d48a0f05fcd2bfef126
Size: 741.01 kB - libxml2-2.9.7-21.el8_10.1.x86_64.rpm
MD5: d93f87e361924e2640a146391cc00acf
SHA-256: 60ec59a011c4241d3ea9695252c445bf112771263ac5a8d021c19b9727230d0f
Size: 695.99 kB - libxml2-devel-2.9.7-21.el8_10.1.i686.rpm
MD5: 0e382671fb7fa8a84c1d86ced16e8b68
SHA-256: 0068d7412eb397c4bb73abde882fb60bc69361cb918c8bdce248c63cc0938606
Size: 1.04 MB - libxml2-devel-2.9.7-21.el8_10.1.x86_64.rpm
MD5: aca90d6ffdb339ef7c6999232f322faa
SHA-256: bfb7a0306e5db35fbbb5ef62d463cdfe5cec6a3599078addb680a9611bdf9c69
Size: 1.04 MB - python3-libxml2-2.9.7-21.el8_10.1.x86_64.rpm
MD5: 5cb391c51562cf2d9c12fb7d2e6371da
SHA-256: 0166af94aa9e84a249a6d0b62647d8d2f87bf460f29947d1b4130e1309a0c769
Size: 237.38 kB